April 17, 2018 By Douglas Bonderud 2 min read

Despite increased spending on global security services, a recent report found that 100 percent of web applications are still vulnerable to cyberattacks. Although the study, conducted by security firm Trustwave, pegged just 8 percent of these vulnerabilities as high-risk or critical, the sheer volume of exploitable flaws means that cybercriminals’ persistence will likely pay off.

Targeted Attacks and Security Spending on the Rise

As noted by TechRepublic, cyberattack vectors are evolving. For example, while the volume of spam emails has dropped significantly over the last 10 years, threats such as PDF phishing, in which attackers send legitimate-looking PDFs that contain links to malicious sites, are on the rise.

While the Trustwave report found that high-profile arrests and increased corporate scrutiny has limited the impact of as-a-service exploit kits, “compromised webpages are too tempting a vector for exploitation for attackers to ignore it for long … inevitably, serious players will perceive a gap in the ‘market’ and fill it.” As a result, cybercriminals are shifting from large-volume exploit kits to more targeted attacks that leverage commonly shared vulnerabilities.

Cybersecurity spending, meanwhile, is on the rise. Gartner predicted that global security services spending will reach $96 billion in 2018 as companies look for ways to mitigate emerging threats and protect critical data. But given the ubiquity of web application vulnerabilities, as noted by the Trustwave report, spending alone won’t solve the problem.

“It is clearer than ever that everyone who relies on today’s technology — not just security and IT professionals — must adopt an informed defensive stand to protect themselves from attack,” the report’s authors wrote.

Improving Global Security Services

Trustwave noted that both frequent system upgrades and rigorous patch management will be required to reduce the number of data breaches. According to CSO Online, enterprises can boost the cybersecurity bottom line by adopting an adversary mindset — that means gathering intelligence on adversaries and using this information to design effective defenses.

Security professionals “should also ensure that employee cybersecurity training is in place at their organization to decrease the likelihood of someone accidentally opening a malicious file or link on a work machine,” according to TechRepublic. This is critical because most attacks start with unintentional downloads, link clicks or email replies.

Finally, another CSO Online article noted that companies are sometimes reluctant to share threat data because these issues are often perceived as IT problems that should be solved internally. But according to GCN, cybersecurity partnerships provide strength in numbers by allowing companies “to better share threat information and provide tactical cybersecurity training to IT staff.”

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today