The Two Sides of ChatGPT: Helping MDR Detect Blind Spots While Bolstering the Phishing Threat

ChatGPT is proving to be something of a double-edged sword when it comes to cybersecurity.

Read More

Unlocking the Power of Co-Managed SOC: A Strategic Solution for Maximizing SIEM Effectiveness and Cybersecurity Success

Security information and event management (SIEM) systems play a pivotal role in cybersecurity: they ...

Read More

Trustwave Measures the Pros and Cons of President Biden’s Executive Order to Regulate AI Development

President Joe Biden, on October 30, signed the first-ever Executive Order designed to regulate and ...

Read More

Continuing the Conversation on Cybersecurity as a Business Risk

Board members often lack technical expertise and may not fully understand the risks associated with ...

Read More

Understanding the Implications of Data Sovereignty and Why Data Residency may be a Better Choice for Your Business

The variety of cloud services that store organizational data continues to proliferate in type and ...

Read More

ChatGPT Update: How Security Teams and Threat Actors are Using Artificial Intelligence

ChatGPT and other Large Learning Modules have been in use for less than a year, yet these ...

Read More

A Multinational Effort Takes Down the Qakbot Banking Trojan

In late August, the FBI took down and dismantled Quakbot, a banking Trojan that primarily spread ...

Read More

CISO’s Corner: Cybersecurity Best Practices: Securing Employee Smartphones

Arguably, the most used device by an organization’s employees is their smartphone. Ensuring that ...

Read More

Managed Vulnerability Scanning Made Easy

There are few security tasks more important, yet more difficult, to conduct than a vulnerability ...

Read More

Creating a Physical Security Standard for Your Company

Cybersecurity is the pressing concern most organizations face when it comes to securing data, but ...

Read More

Protecting Our Communities: Navigating Cyberattacks Against Municipalities and Bolstering Cybersecurity

Municipalities are no strangers to cyberattacks, but the introduction and ready availability of ...

Read More

5 Reasons to Pursue a Career in Cybersecurity

Cyberattacks have not only become more frequent, sophisticated, and costly, but they are not about ...

Read More

The Risks and Rewards of ChatGPT in the Modern Business Environment

ChatGPT continues to lead the news cycle and increase in popularity, with new applications and uses ...

Read More

CISO Connect: Insights on Strategic Partnerships and Threat Readiness

The role of the CISO is expanding alongside the growing adoption of digital technologies, which has ...

Read More

How the Intersection of Technology and Patient Care Creates Security Challenges

The digital transformation of healthcare, involving patients, staff, doctors, and technology, ...

Read More

Using Asset Management to Keep a Cloud Environment Secure

In modern network environments focused on cloud technology, organizations have undergone a ...

Read More

How Trustwave Uses Workforce Skills Frameworks to Assemble Effective Cybersecurity Teams

Building and maintaining a strong, diverse, and technically effective cybersecurity workforce can ...

Read More

Part 2: Federal Cybersecurity Posture is Improving, but Additional Work Remains

Former Texas Congressman William "Mac" Thornberry and Trustwave Government Solutions President Bill ...

Read More

Federal Cybersecurity Posture is Improving, but Additional Work Remains

Former Texas Congressman William "Mac" Thornberry and Trustwave Government Solutions President Bill ...

Read More

Debunking 5 Myths of Attack Surface Management

Attack surface management is certainly a concern for most organizations, but being top of mind does ...

Read More

How MDR Can Bring More Value to Your Endpoint Detection and Response Platform

Endpoint detection and response (EDR) solutions are a crucial element of any cyber defense ...

Read More

Part 2: Is an RFP the Best Use of Your Organization’s Resources?

Yesterday I wrote about some common Request for Proposal (RFP) pitfalls we have seen over the years ...

Read More

Why Threat Hunting is Crucial to a Managed Detection and Response Service

Managed detection and response (MDR) is justifiably one of the fastest-growing areas of ...

Read More

Features Every Managed Detection and Response Solution Must Have

Gartner’s newly released 2023 Market Guide for Managed Detection and Response Services offers ...

Read More

Why Australians Are Keen Adopters Of Managed Security Services

Australia is renowned for our willingness to adopt IT efficiencies!

Read More

Russia-Ukraine CyberWar: One Year Later

One year ago today, Russia launched a massive combined arms ground, air, and sea assault against ...

Read More

SIEM vs MDR: Which is Right for Your Organization?

The decision to buy a Security Information and Event Management (SIEM) product or outsource to a ...

Read More

4 Strategies to Stay Secure in a Connected World

Cybersecurity is a complex term, it’s become all-encompassing and constantly evolving to include ...

Read More