Red, Purple, and Blue: The Colors of a Successful Cybersecurity Testing Program

This is the first in a series of blogs that will describe the importance of conducting Red and ...

Read More

Webinar - The Age of MSSPs: Uncovering the Why’s of Managed Services

With security risks continuously mounting and the threat landscape evolving at record speed, ...

Read More

Data Assessment in Healthcare: Knowing What Data You Have Is Half the Battle

When it comes to protecting personal healthcare information or a medical facility from cyberattacks ...

Read More

Mitigating Third-Party Vendor Risk in Your Supply Chain

A recent survey by the analyst firm Gartner, showed that 89% of companies experienced a supplier ...

Read More

6 Tips for Supply Chain Risk Management in 2022

Forrester recently predicted that in 2022, 60% of security incidents would involve third parties. ...

Read More

How Data Privacy Has Evolved in the Age of the Breach

As Data Privacy Day once again rolls around, we can look back at some healthy improvements when it ...

Read More

Log4j: How a Single Vulnerability Can Affect Multiple Systems

There are truisms that span history. One truism is that a single mistake can lead to disaster, and ...

Read More

Russia’s FSB Takes Down REvil Cyber Gang in an Unprecedented Series of Raids

Reuters reported on Friday that the Russian Federal Security Service (FSB) and local police ...

Read More

How to Outplay the Ransomware Playbook

Organizations across industries are increasingly concerned about their cybersecurity posture and ...

Read More

FIN7 Sends BadUSB Devices to U.S. Businesses as Part of Targeted Ransomware Campaign

First reported by The Record, the FBI has issued a new security Flash Alert warning organizations ...

Read More

CISO's Corner: The Four Best Cybersecurity Investments You Can Make During the Cyber Talent Shortage

The need for strong cybersecurity has reached critical mass. Seventy-six percent of security ...

Read More

Breaking Out of the Vicious Cycle of Ransomware Attacks

Ransomware has quickly become one of the most prevalent cyber threats facing organizations today. ...

Read More

A Year of Threat Intel: Looking Back at SpiderLabs Research in 2021

2021 will go down in the record book as another critical year in the cybersecurity sector, with ...

Read More

The Year in Review: Looking Back at the Top Trustwave Blog Posts

The most popular Trustwave blog posts in 2021 were indicative of the year itself in cyber. There ...

Read More

Preparedness, Speed and Communication are the Cornerstones of a Solid Ransomware Defense

Ransomware attackers today have the technical skill and tools to analyze a target’s defenses and ...

Read More

Cybersecurity in the Year Ahead: Trustwave 2022 Cybersecurity Predictions – APAC Edition

This is part 3 of Trustwave’s 2022 Cybersecurity Predictions blog series brought to you by our APAC ...

Read More

The Cybersecurity Playbook You Need to Run To Mitigate Risk During M&A

Mergers and acquisitions are high-risk endeavors, sometimes with billions of dollars and corporate ...

Read More

Trustwave Gains CREST Vulnerability Assessment Accreditation

Trustwave has been accredited by the internationally-recognized professional certification board ...

Read More

MDR Is No Longer ‘Nice to Have’ for Cyber Resilience, It’s Mandatory

In today’s evolving threat landscape, the decision of whether to bring in external expertise to ...

Read More

Cybersecurity in the Year Ahead: Trustwave 2022 Cybersecurity Predictions – Part 2

This is part 2 of Trustwave’s 2022 Cybersecurity Predictions blog series.

Read More

Zero Trust: Public and Private Sectors Facing Similar Risks

Kevin Kerr, Lead Security Principal Consultant at Trustwave, participated in a discussion on Zero ...

Read More

The Network Effect and the Search for Resilient Email Security

'Email is dead. It's a thing of the past.'

Read More

The Great Cybersecurity Talent Migration has Begun, Here’s What you Can Do

The macro-economic consequences of COVID-19 have reached cybersecurity and the talented people who ...

Read More

MDR Provider, MSSP or Both? Focus on the Capabilities You Need

Over the last several years, Managed Security Service Providers (MSSP) have evolved, and some have ...

Read More

Cybersecurity in the Year Ahead: The Trustwave 2022 Cybersecurity Predictions

In 2021, the cybersecurity industry was truly tested. Most notably, we uncovered the deeper fallout ...

Read More

The Importance of Speed During Detection and Response: Iranian-Backed Hackers Targeting U.S. Companies with Ransomware

Iranian government-sponsored advanced persistent threat (APT) actors are exploiting known Microsoft ...

Read More

Planning and Deploying Security Automation Leveraging MITRE ATT&CK and SHIELD with Microsoft Sentinel

Deploying security automation is hard if the criteria for success is beyond the scope of ticketing ...

Read More

Crisis Simulation: The 4 Most Common Cybersecurity Incident Shortfalls

For an organization to be resilient, key personnel must be acutely aware of their roles and ...

Read More