Why Offensive Security Is Crucial for Retail Resilience

Connect with us at the Gartner® Security & Risk Management Summit June 9-11. Learn More
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
Connect with us at the Gartner® Security & Risk Management Summit June 9-11. Learn More
The three high-profile UK retailers struck with cyberattacks in the last few weeks are each still feeling the impact of the attacks and attempting to regain full functionality across all their systems.
These incidents highlight the need for retailers, and in fact all organizations, to have a multi-point Offensive Security process in place to determine possible security soft spots, but to also actively hunt for known threats, and finally a well-though out and thoroughly rehearsed digital forensics and incident response (DFIR) plan.
The details on each attack are still not fully known, but published reports state that Marks & Spencer (M&S), Harrods, and Co-op were all struck, with the Marks & Spencer incident being confirmed as a ransomware attack. Co-op has confirmed that customer data was stolen, while Harrods noted it was dealing with an attempt at unauthorized access.
The threat group Scattered Spider, which Trustwave SpiderLabs has been tracking for more than a year, has been attributed to the M&S attack. Attribution for the others is not confirmed, although the ransomware group DragonForce has claimed responsibility.
Offensive Security is a proactive and adversarial approach to fortifying computer systems, networks, and individuals from cyberattacks. It involves using active, hence offensive, measures to outsmart and defeat attackers.
These include penetration testing, ethical hacking, and Red Team exercises to find vulnerabilities before the bad guys do.
In addition to relying on more defensive-oriented cybersecurity measures like managed detection and response (MDR), email security, firewalls, or database security, offensive security has security teams actively hunting not only for intruders in a system, but also testing for weaknesses and paths an adversary can take to gain entry using techniques such as, penetration testing, ethical hacking and Red Team exercises to find vulnerabilities before the bad guys.
The goal is to get ahead of an attacker, block possible routes before they become an issue, and provide an organization with a realistic view of its security posture from an attacker's perspective.
While implementing all of the following programs would be best, adding just a few will go far toward helping you better understand your security posture.
Digital Forensics and Incident Response is the last chess piece that needs to be placed on the board.
According to the 2024 Gartner® Market Guide for Digital Forensics and Incident Response (DFIR) Retainer Services, DFIR vendor solutions should include the following:
Additionally, to effectively prepare for and respond to security incidents, Gartner® suggests that DFIR providers offer a comprehensive suite of services, such as red teaming and tabletop exercises, penetration testing, and training workshops, to further enhance an organization's security resilience.
Trustwave's DFIR approach delivers clarity amidst the chaos of a cyberattack. Our expert consultants swiftly pinpoint the cause and scope of a breach, empowering organizations to prepare for the inevitable.
By leveraging our DFIR consulting retainer, clients gain immediate access to Trustwave SpiderLabs' elite team, acting as the first line of defense. With a global presence, expert responders are on call 24/7 to initiate forensic investigations instantly.
A Trustwave DFIR retainer offers:
Trustwave's Offensive Security program cuts through the complexity of cyber incidents, providing insights, expertise, and the support needed to minimize impact and preserve critical evidence.
Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.
Copyright © 2025 Trustwave Holdings, Inc. All rights reserved.