Organizations can’t just rely on diverse and cutting-edge technologies to fight adversaries. They will also need people with diverse expertise and backgrounds.
Sure Links Up With Cyber Experts
Telecoms company Sure has joined forces with a firm fighting the threat from cybercrime. The company is called Trustwave.
How to Stay Secure While Shopping Online
Hackers are targeting credit cards online more, a new report found. The number of cards being targeted went up by 7 percent, according to Trustwave’s global security report.
Trustwave Report: Threat Containment Getting Better
Given much of the publicity that is routinely attached to every breach disclosure these days, it’s easy to be pessimistic about the overall state of cybersecurity.
Gartner Magic Quadrant for Managed Security Services 2019: Analysis
Gartner’s Magic Quadrant 2019 for managed security services providers (MSSPs) has surfaced. Here’s a look at each MSSP featured in the report, along with our perspectives on each cybersecurity business.
Enterprises Not Doing So Well on Net Protections
You may have business relationships with an internationally located vendor, supplier, provider, contractor, employee, or customer. You may have boosted cybersecurity in your network. Be vigilant, attackers can use your business relationships as stepping-stones into your network.
Industry Reactions to Cybersecurity Workforce Executive Order
The White House says there are over 300,000 cybersecurity job vacancies in the United States and believes it’s crucial for the country’s economy and security that these jobs are filled.
Trustwave Releases New Database Security Updates
Trustwave is introducing a new database security scanning and testing software that helps organizations better protect critical data assets hosted on-site or by major cloud service providers.
MSSP Trustwave Unveils Database Security Scanning Testing Software
Trustwave, a Top 100 MSSP, has introduced the DbProtect database security scanning and testing software. DbProtect provides data visibility and protection and compliance management capabilities, according to Trustwave.
Data: E-Retail Hacks More Lucrative Than Ever
This in-depth report from Trustwave contains a number of useful suggestions that sites can consider for a defense-in-depth approach to combating an increasingly crowded field of criminal groups turning more of their attention toward stealing CVV data.
Cyber-security Is Improving Though Risk Continues to Grow
The 2019 Trustwave Global Security Report, released on April 25, has its fair share of bad news as it has found that multiple types of attacks have grown and attackers have continued to increase levels of sophistication.
Piracy Apps Surf for Vulnerabilities
Cyber criminals are attacking more accounts in the Asia Pacific region than North America, representing 35 percent of investigated data compromises, according to the annual report out today by Trustwave.
The Pulse of Risk Detection and Response at RSA 2019
Trustwave, which offers Managed Detection and Response (MDR) services, has taken a number of steps to build stronger context into their operations. They are feeding data about known bad actors into their intel fusion platform (IFP).
LokiBot Trojan Spotted Hitching a Ride Inside .PNG Files
A spam campaign pushing the info-stealing LokiBot trojan leverages a novel technique to avoid detection. According to researchers, the spam messages include malicious .zipx attachment hidden inside a .PNG file that can slip past some email security gateways.
CIA Extortion Scams Using SatoshiBox to Sell Alleged Proof for $500
The CIA extortion scams continue to evolve in order to squeeze as much money out of a victim as they can. In a new variant discovered by researchers, the extortion emails are now selling alleged proof on Satoshi Box for $500 that show you are part of the CIA investigation.
Attitude Is More Important Than Your Current Skill Set
Lawrence Munro, worldwide vice president of Trustwave SpiderLabs, on active threat hunting and what it takes to become a red teamer.
How to Break into Penetration Testing – an Expert’s Guide
In his role leading penetration testing services at Trustwave, Lawrence Munro, VP SpiderLabs, has pulled together the attributes, experience and qualifications he considers necessary to crack a career in this challenging space.
Hackers Use Pakistani Passport Website to Spy on Visitors
Hackers modified a Pakistani government website where citizens can request passports to spy on its visitors, according to researchers at Trustwave.
Pen Testing Takes Center Stage at RSA
It’s more important than ever for cybersecurity professional to understand how attackers can gain access to sensitive company or customer data. While it’s still important to examine vulnerabilities in isolation, the ability to understand attack paths and how attackers can gain access to data.
The Winners of the 2019 SC Awards Honored in the U.S.
Trustwave Managed Security Services’ elite team of 250 ethical hackers isn’t just protecting some of the world’s largest enterprises and government agencies. It’s actually reimagining ways that entire industries can protect their assets.
Why Cybersecurity Burnout Is Real (and What to Do About It)
The constant stresses from advanced malware to zero-day vulnerabilities can easily turn into employee overload with potentially dangerous consequences. Here’s how to turn down the pressure.
Trustwave Embraces Cybereason MDR for Endpoints
Trustwave, a Top 100 MSSP, has integrated the Cybereason Defense Platform into its Managed Detection and Response (MDR) for Endpoints service.
Why Are You Looking at Me? I See You Watching Me.
Arjun and Jessica Sud routinely use a baby monitor to keep tabs on their 7-month-old’s bedroom. Last month, they heard something chilling through the monitor: A deep male voice was speaking to their child.
A Guide to Choosing a Cloud-Based Security Services
Cloud-based security services can help organisations with a growing cloud footprint to reduce cost and address the manpower crunch in cyber security.
How Criminals Use Uber and Airbnb to Launder Money Stolen from Your Credit Card
Cybercriminals are turning to new technologies to launder their ill-gotten gains, including recruiting fake Uber drivers, shady Airbnb hosts and crypto conversion specialists via underground dark web, experts say.
Security Bugs in Video Chat Tools Enable Remote Attackers
Newly discovered security bugs in Lifesize videoconferencing products can be remotely exploited, giving attackers the ability to spy on a target organization or attack other devices.
Trustwave Secure Email Gateway Now Supports Microsoft Azure RMS
Today’s topics include Trustwave improving its Secure Email Gateway to reduce email threats.
Trustwave Improves Secure Email Gateway to Reduce Email Threats
Trustwave announced the latest iteration of its email security platform with the unveiling of Secure Email Gateway (SEG) 8.2. Among the highlights is support for the Microsoft Azure Rights Management System (RMS), which is used to protect against data loss and unauthorized access.
Why Good Database Security Planning is Essential for Protecting a Company’s Most Important Assets
Attackers know that shutting companies out of their own data can quickly cripple an organization and put the pressure on to consider paying the ransom.
The Year Cryptojacking Ate The Web
Cybersecurity can feel like a chaotic free-for-all sometimes, but it’s not every day that a whole new conceptual type of attack crops up. Over the last 15 months, though, cryptojacking has been exactly that. It’s officially everywhere, and it’s not going away.