Throw a Light on the Dark World of Cybercrime

Vulnerabilities are a clear path for attackers to gain access to your sensitive data. Learn how security gaps introduce risk and how to address them.

March 18, 2019

The fight against cybercriminals never ends, but there’s a valuable resource that can give you an advantage—continuous research into the vulnerabilities across your diverse technology infrastructure. Continuous vulnerability research shines a bright light into your opponents’ dark world

According to Gartner, vulnerability exploitation is the cause of most information security breaches, and any breach can harm your business, diminish customer trust, impact revenue, and depress shareholder value. A single attack that takes advantage of a vulnerability can also lead to costly fines for non-compliance with data protection regulations like the General Data Protection Regulation (GDPR).

"(ICS)2 estimates that the number of unfilled cybersecurity jobs has soared to almost 3 million."

The Trend Micro Zero Day Initiative (ZDI), a leading bug bounty program and number one public discloser of vulnerabilities, reported the total number of publicly disclosed vulnerabilities in 2018 was 1444—over 40 percent higher than 2017. And all indicators suggest that the number identified but not reported is even higher.

But where do you find the time and resources to identify and patch vulnerabilities when cybersecurity skills are in such short supply? (ICS)2 estimates that the number of unfilled cybersecurity jobs has soared to almost 3 million.

What is the solution?

Cybersecurity experts recommend a two-pronged approach:

1 – Align vulnerability management priorities with the greatest security threats.

When you know where the biggest security risks lie in your operating systems, applications, and devices, you can prioritize your vulnerability management spending and maximize the returns in enhanced protection.

Only two percent of reported vulnerabilities are self-disclosed. The rest are disclosed by cybersecurity companies like Trend Micro with the expertise and workforce to research and identify the latest vulnerabilities and keep you aware of the risks that may be hiding in your IT infrastructure.

2 – Evaluate the potential impact associated with any given vulnerability.

Grade each vulnerability according to the nature and extent of the compromise they introduce, and develop patches or shield those that represent the greatest threat to you and your company. Vulnerabilities that are already being exploited by cybercriminals will be your first priority.

The information you need to make these important decisions can only come from experienced security organizations like Trend Micro that are dedicating significant time, effort, and resources to threat and vulnerability research programs. Trend Micro Research continuously feeds our development efforts to build protection into our products and services—the protection you need to keep your organization out of harm’s way.

Read Trend Micro’s Vulnerability Research eBook to learn more about how vulnerabilities expose your organization to risk and how you can streamline vulnerability management for maximum protection.

Trend Micro Vulnerability Research
Learn more about how to reduce risk and maximize protection with streamlined vulnerability management.

About Trend Micro Research

Trend Micro Research is powered by experts who are passionate about discovering new threats, sharing key insights with the public, and supporting efforts to stop cybercriminals. Our global team helps identify millions of threats daily, leads the industry in vulnerability disclosures, and publishes innovative research on targeted attacks, artificial intelligence, Internet of Things (IoT), cybercriminals, and more. We continually work to anticipate the next wave of threats and deliver thought-provoking research that can shape strategic industry direction.