
It is estimated that the global economy loses $400 Billion/year to cybersecurity incidents1, despite data security becoming a board-level discussion item2. This is happening as the vast majority of attacks target end-users and over 90% of these attacks coming through malware that is delivered through web browsing3. Even as security becomes a growing concern and area of investment, the solutions are lagging behind, prompting a leading report to state “One thing is very clear: The cybersecurity programs of US organizations do not rival the persistence, tactical skills, and technological prowess of their potential cyber adversaries”4.
How can this be? The problem does not lie with organizations lack of diligence, priority, or investment. Companies have been piling on additional security controls, while seeing diminishing returns and skyrocketing costs. Rather, this situation is caused by the over-reliance on detection and prevention as the mechanisms to defeat attacks, while there is no separation between vulnerable systems and potentially malicious content.
Detection cannot fully protect from all attacks, as it is by its very nature reactive: the attackers innovate with their findings and new techniques, and solutions need to rely on reputation or heuristics for detection. Both approaches have been found lacking with reputation becoming irrelevant as 90% of malware become unique to each organization5 and web security gateway classification allowing as much as 90% of malicious traffic through6. Heuristics fare no better with even the most advanced solutions only detecting 72% of “zero day” attacks7, and 81% of respondents in a large survey claiming that “Even with my organization’s security tools, web- borne malware can be completely undetectable”8.
The root cause of vulnerabilities that organizations experience is lack of separation: The Internet is too large and varied to be effectively classified, and active content by default is transferred “en banc” to browsers. Organizations are left with a never-ending chase to detect malice instead of isolating vulnerable targets and the content from each other.
-
1. Mcafee: “Net losses: Estimating the global cost of Cybercrime”
-
2. http://www.forbes.com/sites/frontline/2014/12/27/why-its-time-for-a-board-level-cybersecurity-committee/
-
3. Verizon business report, Palo Alto networks report.
-
4. PWC report: “US cybercrime: Rising risks, reduced readiness”
-
5. Verizon 2015 data breach report
-
6. http://www.seculert.com/blog/2015/04/perimeter-security-defense-time-to-think-different.html
-
7. FireEye- “The new normal, economic cyber-warfare is here to stay”
-
8. Ponemon Institute “The challenge of preventing browser-borne malware”



