Identity, Endpoints, and the Cloud Drive the Microsoft Security Product E5 Decision

The Power of Multifactor Authentication and a Strong Security Culture

The business mantra "employees are our number one asset" is true for many reasons. Including ...

Read More

When Patching Goes Wrong: Lessons Learned from The CrowdStrike Incident

Patches are a way of life for any network administrator and are the most efficient method in place ...

Read More

Balancing Escalating Security Concerns While Pursuing Business Innovation

Australia's business leaders face a complex and rapidly evolving market landscape that is highly ...

Read More

CISO Webinar Outlines Trustwave's Journey to Adopting Microsoft E5 Security Offerings

The decision on whether to implement the Microsoft Security offerings available with the Microsoft ...

Read More

Achieving High Organizational Security Scores Using Microsoft Secure Score

As businesses engage in increasingly complex and interdependent relationships, ensuring all parties ...

Read More

Get to Know MXDR: A Managed Detection and Response Service for Microsoft Security

The Microsoft 365 E5 license gives users entitlements to numerous Microsoft Security products—so ...

Read More

UK Must Prioritize Cybersecurity Governance Amidst Rising Threat of Cybercrime

If the UK is serious about digitizing the economy, then cybersecurity is priority number one and ...

Read More

Behind the Scenes of the Change Healthcare Ransomware Attack Cyber Gang Dispute

Editor’s Note – The situation with the Change Healthcare cyberattack is changing frequently. The ...

Read More

Managed Detection and Response Providers Shouldn’t Lay Claim to Your Custom Content

Among the due diligence a company should perform when signing with a managed detection and response ...

Read More

Why Offensive Security is a Necessity for a Dynamic Threat Landscape

Today's ever-shifting threat landscape demands a multi-pronged approach to cybersecurity. ...

Read More

Unlocking Cyber Resilience: UK’s NCSC Drafts Code of Practice to Elevate Cybersecurity Governance in UK Businesses

In late January, the UK’s National Cyber Security Centre (NCSC) issued the draft of its Code of ...

Read More

LockBit Takedown: Law Enforcement Disrupts Operations, but Ransomware Threats Likely to Persist

The news that US, UK, and other international law enforcement agencies disrupted LockBit is ...

Read More

Understanding Why Supply Chain Security is Often Unheeded

Many organizations downplay the critical aspect of whether their cybersecurity provider has the ...

Read More

Winning the Super Bowl of Security: An Offense-Informed Defensive Strategy

We always emphasize that cybersecurity is a team sport. As millions sit down to watch the Kansas ...

Read More

Preparing for the Impact of Artificial Intelligence's Cybersecurity

The integration of Artificial intelligence (AI) is forcing a significant transformation in the ...

Read More

Federal Water and Wastewater Security Incident Response Guide Falls Short

This week, federal guidelines were published to assist owners and operators in the water and ...

Read More

Top 10 Trustwave Blog Posts: Industry Threat Reports, Developing Robust Security Top of Mind for 2023

The most popular Trustwave blog posts in 2023 were a roadmap of what concerned our readers during ...

Read More

Trustwave 2024 Predictions Part 2: Cyber Talent Shortage and the US Federal Government

There is every reason to believe that 2024 will be an interesting year in the cybersecurity space, ...

Read More

Trustwave 2024 Cybersecurity Predictions: Artificial Intelligence and the US Presidential Election

There is every reason to believe that 2024 may be an interesting year in the cybersecurity space, ...

Read More

Unlock the Power of Your SIEM with Co-Managed SOC

Security information and event management (SIEM) systems play a pivotal role in cybersecurity: they ...

Read More

Trustwave’s Observations on the Recent Cyberattack on Aliquippa Water Treatment Plant

The attack last week on the Municipal Water Authority in Aliquippa, Penn., that gave threat actors ...

Read More

How Trustwave Can Assist Tribal Governments Applying for $18 Million in DHS Cybersecurity Grants

Tribal governments are among the most underserved organizations in the US when it comes to ...

Read More

The Two Sides of ChatGPT: Helping MDR Detect Blind Spots While Bolstering the Phishing Threat

ChatGPT is proving to be something of a double-edged sword when it comes to cybersecurity.

Read More

Unlocking the Power of Co-Managed SOC: A Strategic Solution for Maximizing SIEM Effectiveness and Cybersecurity Success

Security information and event management (SIEM) systems play a pivotal role in cybersecurity: they ...

Read More

Trustwave Measures the Pros and Cons of President Biden’s Executive Order to Regulate AI Development

President Joe Biden, on October 30, signed the first-ever Executive Order designed to regulate and ...

Read More

Continuing the Conversation on Cybersecurity as a Business Risk

Board members often lack technical expertise and may not fully understand the risks associated with ...

Read More

Understanding the Implications of Data Sovereignty and Why Data Residency may be a Better Choice for Your Business

The variety of cloud services that store organizational data continues to proliferate in type and ...

Read More