Preparedness, Speed and Communication are the Cornerstones of a Solid Ransomware Defense

Ransomware attackers today have the technical skill and tools to analyze a target’s defenses and ...

Read More

MDR Provider, MSSP or Both? Focus on the Capabilities You Need

Over the last several years, Managed Security Service Providers (MSSP) have evolved, and some have ...

Read More

Cybersecurity in the Year Ahead: The Trustwave 2022 Cybersecurity Predictions

In 2021, the cybersecurity industry was truly tested. Most notably, we uncovered the deeper fallout ...

Read More

The Importance of Speed During Detection and Response: Iranian-Backed Hackers Targeting U.S. Companies with Ransomware

Iranian government-sponsored advanced persistent threat (APT) actors are exploiting known Microsoft ...

Read More

Europol Operation Targets Ransomware Operators

Europol, the European Union’s law enforcement agency, on Oct. 26, targeted 12 individuals in raids, ...

Read More

Mitigating Increasingly Serious and Sophisticated Ransomware Threats

October is Cybersecurity Awareness Month, and so now is the perfect time for a quick reminder that ...

Read More

NSA and CISA Issue Release Guidance on Proper VPN Deployment

This week, the National Security Agency and the Cybersecurity and Infrastructure Security Agency ...

Read More

Cybersecurity Basics: Determining Your Vulnerability Testing Needs

When it comes to maintaining a strong organizational security posture, proactive testing should be ...

Read More

Singapore Companies Faced With the Threat of Sophisticated Ransomware Attacks. Is Your Company Prepared?

Cyber-attacks have intensified in the last eight months of 2021. The Straits Times reported an ...

Read More

The 10 Principles of Database Security

Best Practices to Stay Ahead of Hackers and Secure Your Critical Data

Read More

Managing Supply Chain Cyber Risk: Know What You Control – and Detect What You Don’t

As we announce Managed Vendor Risk Assessment (MVRA), a first-of-its-kind cyber supply chain risk ...

Read More

Seven Months After the SolarWinds Attack: What Has Changed and What Still Needs To

You likely know the story. In December of 2020, perhaps the most devastating cybersecurity breach ...

Read More

The Top Cybersecurity Best Practices for Manufacturing Companies To Follow During the Height of Ransomware

Today’s manufacturing industry is straddling a line between traditional, legacy operations and ...

Read More

Trustwave 2021 Network Security Report Shows How Threats Have Evolved in a Remote Workforce World

The COVID-19 pandemic created enormous challenges for businesses worldwide – and cybersecurity ...

Read More

How Diversifying Your Cybersecurity Team Can Help You Combat the Cyber Skills Shortage

What if the current handwringing around a cyber skills shortage was overdone? What if the problem ...

Read More

Trustwave 2021 Email Threat Report Highlights Critical Trends in Email Security in the Age of Advanced Threats

Most mature organizations have recognized the importance of email security and subsequently added ...

Read More

Colonial Pipeline Attack Spotlights the Importance of Ransomware Preparedness

We’re sure you’ve seen the news on the latest ransomware attack on Colonial Pipeline.

Read More

How Your Security Testing Mindset Should Change After COVID-19

As states move toward gradually lifting restrictions and allowing people to return to work, ...

Read More

Know Your Enemy: Leveraging the Dark Web to Strengthen Security

Virtual, underground marketplaces operating on the Dark Web generate billions of dollars worth of ...

Read More

How I Hacked A Nuclear Power Plant

In cybersecurity, the worst-case scenario is that malicious hackers might gain access to, or ...

Read More

Discussing the SolarWinds Discovery

With its recent discovery of three new vulnerabilities in SolarWinds products, the Trustwave ...

Read More

Discussing the Go SMS Pro Discovery

What if the messenger app that you were using was not only exposing your data to almost anyone on ...

Read More

How Much Risk Is Hiding in Your Organization’s Internet of Things (IoT)?

As the “internet of things,” commonly known as IoT, matures and grows every year, it has ...

Read More

Discussing What Security Testing Is and Will Be

Since cyber-attacks are constantly evolving, security testing needs to evolve in response. But that ...

Read More

Using Microsoft 365? Why Complementary Security Tools are Essential

Many enterprise organizations use Office 365 (recently renamed Microsoft 365) as a robust suite of ...

Read More

Spotlight on Trustwave SpiderLabs, Part 2: Incident Response and Threat Hunting

This two-part article will introduce and provide an overview of the SpiderLabs team at Trustwave ...

Read More

Spotlight on Trustwave SpiderLabs, Part 1: Proactive Threat Intelligence

This two-part article will introduce and provide an overview of the SpiderLabs team at Trustwave ...

Read More

Database Security: Your Organization’s Last Line of Defense

Every company has data they use to run their business, whether it’s personal data for their ...

Read More