Cyber Defense Magazine: Firewalls Aren't Enough for Network Protection

By: Pat McGarry, CTO, Threater
The Cybersecurity and Infrastructure Security Agency (CISA) recently added 66 vulnerabilities to its list of known exploited security holes, including a WatchGuard firewall vulnerability exploited in attacks linked to a Russian state-sponsored threat actor. CISA’s call to patch this vulnerability follows on the heels of last year’s Colonial Pipeline attack, as well as other cybersecurity incidents where firewalls were breached. Whether the threat came in through the front door or not, every successful cyberattack has breached a firewall at some point.
There’s no denying that cybercriminals are growing increasingly sophisticated – just look at the headlines from recent years. Unfortunately, despite industry innovation and government guidance, what organizations are doing to protect themselves has largely remained the same. We’re seeing it more and more: Firewalls are becoming antiquated when compared to the sophisticated technologies used by cybercriminals. It’s high time for organizations to acknowledge the firewall gaps and take steps to build more robust cybersecurity defenses.
While firewalls can detect attacks within an organization’s network, they don’t work when the attacker is already inside. Advanced firewall solutions may be able to identify unusual behavior, but they can’t prevent the exfiltration of account data from within the authorized account. Firewalls only use a limited amount of cyber intelligence and have limited ability to handle additional cyber intelligence sources, allowing threats to sneak past. Not to mention, managing the small amount of threat intelligence you can add to a firewall is slow due to its manual nature. This “firewall gap” problem creates challenges for organizations when it comes to updating their cybersecurity defenses and securing their networks.
The threat intelligence volume of limits of firewalls combined with the dynamic nature of threat intelligence amplify these problems. Threats are rapidly changing and so is threat intelligence, the dynamic nature of which makes it nearly impossible and impractical to manage manually. Multi-source cyberintelligence should include commercial threat intelligence providers, open source intelligence (OSINT), government cyber intelligence, and industry threat intelligence to assist organizations in effectively detecting and blocking threats. With this wide array of cyber intelligence available combined with the fact that organizations also generate their own valuable intelligence, it’s critical to have the flexibility to add more sources of intelligence and an integration process that doesn’t delay an organization’s ability to rapidly respond to threats.
The Colonial Pipeline, JBS, Volkswagen, and ParkMobile incidents all have one thing in common: They all had firewalls protecting their networks but they were still breached. While firewalls continue to provide an important layer of network protection, they can’t protect a network on their own. With gaps like the limited view of threat intelligence that firewalls use to detect and block threats combined with a limited ability to significantly increase the intelligence of your firewall, your network is only partially protected from today’s cyber threats.
As cybercriminals become increasingly sophisticated and their attack vectors evolve, we must too. Organizations can no longer protect against real-time data threats with an approach based on reactive legacy solutions. To keep pace with the cyber threats of today and tomorrow, organizations need realtime threat intelligence from multiple sources and automated protection to defend their network in every moment.