Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 steps to ward off zero-day exploits

Why zero-day exploits are cybersecurity’s worst nightmare

By Anneka Gupta
cyber-security-freepik1170x658v469.jpg

Image via Freepik

July 5, 2022

SolarWinds. Log4Shell. Heartbleed. Colonial Pipeline. These headline-making cyberattacks of recent years have one thing in common: They are all examples of zero-day exploits.

 

Zero-day exploits are an especially dangerous form of hacking because they use vulnerabilities that were previously unknown and for which no patch yet exists. Depending on the company, the time between breach and fix can span days, weeks, months, or even years as hackers lie in the shadows and plot their attack.


It’s a growing problem. Ransomware affected 649 critical infrastructure organizations in 2021, according to the FBI’s latest annual Internet Crime Report. The Ponemon Institute says up to 80% of successful breaches are zero-day attacks.

 

“One contributing factor in the higher rate of reported zero-days is the rapid global proliferation of hacking tools,” a report by MIT Technology Review said. “Powerful groups are all pouring heaps of cash into zero-days to use for themselves — and they’re reaping the rewards.” Many of those groups are state sponsored.

 

Given the severity of the threat, it is necessary for organizations to take a proactive and comprehensive approach to warding off zero-day exploits. That strategy should include the following five parts.

 

1. Strong security hygiene in software development

In today’s fast-paced, multi-faceted development environment, it has become more difficult than ever to avoid introducing vulnerabilities at some point. The heavy use of modular components means that developers often use resources they don’t even control, such as open source and other third-party code and tools. This means it is inherently difficult to identify every possible hole.

 

As a result, it is critical for organizations to double down on their efforts to uncover vulnerabilities. For example, penetration testing to assess security across the software pipeline should be standard practice at every company. Another smart move is to use bounty hunters, white-hat hackers hired to detect vulnerabilities in a company’s infrastructure that bad actors could exploit.

 

Companies also can and should continuously scan their systems and data over time to identify compromises as soon as they happen and remediate quickly. 

 

These kinds of internal controls may not be able to stop every vulnerability, but they can go a long way in detecting unseen errors introduced in development that can lead to big security problems down the road.

 

2. Zero trust security

Zero trust is a “trust no one, always verify” security architecture that assumes everything in an enterprise represents a possible attack vector. It differs from the traditional “trust but verify” model that gives users or devices with basic credentials wide access to digital assets. Instead, zero trust limits and restricts access to only the minimum set of users and devices, places time constraints on privileged access, and considers every access point a point of a potential breach.

 

Though zero trust has traditionally been viewed as a network security model, the principles apply to data security and security architecture, in general. Zero trust is a great model for defending data across enterprise, cloud and Software as a Service workloads.

 

While zero-trust security doesn’t protect networks from every possible attack, it lowers risk and accelerates threat detection. Every organization — regardless of size or industry — would be wise to adopt it.

 

3. Rigorous patching practices

Zero-day exploits begin with previously unknown vulnerabilities. In fortunate cases, patches are issued to plug the vulnerabilities before a successful attack is made. But it’s up to companies to apply them.

 

In 2020, the FBI charged four Chinese military-backed hackers with executing a 2017 cyberattack against consumer credit reporting agency Equifax that led to the largest known theft of personally identifiable information ever carried out by state-sponsored actors. The attackers initially gained access through a consumer complaint web portal by using a widely known vulnerability that the company never patched.

 

Monitoring and administering patches can be a very time-consuming and tedious task. However, as onerous as it can be, organizations have no choice but to develop solid patching discipline. An ounce of prevention is worth a pound of cure.

 

4. Training

This is another area that requires considerable time and effort, but employee education is a must to reduce the risk of zero-day and any other attacks. The best training is across the board, from phishing attack awareness programs to helping developers understand what they can do to avoid security shortcuts.

 

Every company, no matter its size or industry, should assume it is a potential target and be aggressive in training employees to help protect against attack.

 

5. Recovery plan

Unfortunately, even despite the four measures above, an attack can still happen. That’s simply the reality of today’s threat landscape and the continued use of outdated legacy technology that was never built with security in mind at conception. Thus, organizations need to have a plan in place for if a zero-day attack happens.

 

Questions companies should be asking themselves include: Do we know where all our data resides, especially the most sensitive data? (Astonishing numbers of companies lack that full understanding.) Do we have a well-crafted recovery and backup plan? Do we have a default process outlining what steps need to be taken, in what order, led and executed by whom? How quickly can we recover? Have we tested our recovery practices to prepare for a real-life scenario?

 

If the answer to any of those is no, a company will surely have more trouble bouncing back from a zero-day attack than is necessary.

 

Zero-day exploits are some of the nastiest cybersecurity surprise that an organization can face, but as these five points show, it is possible to prepare for the unexpected. Remember: The defense needs to be as aggressive as the threat.

 

KEYWORDS: cyber security risk management zero trust zero-day vulnerability

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

 

Anneka Gupta is Chief Product Officer at zero trust data security company Rubrik.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Unlock the future of cybersecurity news with Security.
As a leader in enterprise security, we have you covered with the information to keep you ahead of the curve.

JOIN TODAY

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • threat-intel-freepik1170x658.jpg

    Proactive threat hunting is vital to zero-day vulnerability management

    See More
  • cyber-developer-freepik.jpg

    Microsoft, CISA warn of new zero-day flaw

    See More
  • leadership

    From DIACAP to RMF: 5 Useful Tips to Start Your Compliance Transition Off on the Right Foot

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!