Through the Looking Glass of Risk: An Analysis of the SOCI Reforms as a Case Study for critical Infrastructure Security Regulation

This blog examines some interesting aspects of the recent reforms to Australia's Security of ...

Read More

An Inside Look at Russian Cyber Weapons Used Against Ukraine

Observing the ongoing conflict between Russia and Ukraine, we can clearly see that cyberattacks ...

Read More

Protecting the Modern Healthcare Industry Requires Human Expertise and Innovative Partnerships

Protecting healthcare-related data requires a special level of technological and human support ...

Read More

Executive Order on Improving the Nation’s Cybersecurity: One Year Later

In May 2021, President Joe Biden signed the 30 - page Executive Order (EO) on Improving the ...

Read More

6 Top Cloud Security Problems – from a GRC consultant’s perspective

The typical life of a consultant working in the field of governance, risk and compliance is often ...

Read More

When it Comes to Email Security Good Enough is Not Enough

There is an underlying constant when it comes to creating a strong defense—the more layers of ...

Read More

A Cautionary Tale of a Data Breach

If you're reading this blog, there's a good chance you're familiar with the topic of data breaches; ...

Read More

Now is the time to Partner With Trustwave MDR

Trustwave Managed Detection and Response (MDR) is one of the most important cybersecurity offerings ...

Read More

CISO's Corner: Cyber Defense Lessons for OT and Supply Chain Infrastructure

2022 has been busy in the cyber world. While there were signals in 2021 with the increased in ...

Read More

Best Practices for Securing Wireless Networks

Most organizations employ mobile computing, which utilizes wireless communications for staff ...

Read More

MailMarshal: Protecting Against Email-based Threats Has Become Survival of the Fittest

Email security is not a simple check-box item. The need to have a strong email security solution in ...

Read More

Good Enough is not Enough When It Comes to Database Security

The threats facing databases today are numerous and constantly evolving as the perimeter continues ...

Read More

CISO's Corner: 5 Questions to Ask Before Implementing an XDR Program

Let's dive head-first into this new security acronym, XDR, or extended detection and response. ...

Read More

Trustwave Security Colony Vendor Assessment: Know Your Vulnerabilities Before Others Do

This is the second installment in Trustwave’s in-depth tour of our Security Colony platform. For a ...

Read More

Enhancing Your Operational Technology Resiliency

Maintaining cyber resilience across your ecosystem is a significant challenge that must not be ...

Read More

Purple Team Exercises: Preparing a Cybersecurity Team for a Red Team Attack

This is the second in a series of blogs that describes the importance and inner workings of ...

Read More

5 Ways CISOs Can Leverage the Power of Trustwave Security Colony

Home improvement stores like Home Depot and Lowes are the lifeline for a lot of contractors looking ...

Read More

Creating Buy-In for a Cybersecurity Awareness Program

There is more to implementing a successful cybersecurity training program than to task IT with the ...

Read More

Red, Purple, and Blue: The Colors of a Successful Cybersecurity Testing Program

This is the first in a series of blogs that will describe the importance of conducting Red and ...

Read More

Webinar - The Age of MSSPs: Uncovering the Why’s of Managed Services

With security risks continuously mounting and the threat landscape evolving at record speed, ...

Read More

Data Assessment in Healthcare: Knowing What Data You Have Is Half the Battle

When it comes to protecting personal healthcare information or a medical facility from cyberattacks ...

Read More

How Data Privacy Has Evolved in the Age of the Breach

As Data Privacy Day once again rolls around, we can look back at some healthy improvements when it ...

Read More

The Year in Review: Looking Back at the Top Trustwave Blog Posts

The most popular Trustwave blog posts in 2021 were indicative of the year itself in cyber. There ...

Read More

The Cybersecurity Playbook You Need to Run To Mitigate Risk During M&A

Mergers and acquisitions are high-risk endeavors, sometimes with billions of dollars and corporate ...

Read More

MDR Is No Longer ‘Nice to Have’ for Cyber Resilience, It’s Mandatory

In today’s evolving threat landscape, the decision of whether to bring in external expertise to ...

Read More

Cybersecurity in the Year Ahead: Trustwave 2022 Cybersecurity Predictions – Part 2

This is part 2 of Trustwave’s 2022 Cybersecurity Predictions blog series.

Read More

The Great Cybersecurity Talent Migration has Begun, Here’s What you Can Do

The macro-economic consequences of COVID-19 have reached cybersecurity and the talented people who ...

Read More

Crisis Simulation: The 4 Most Common Cybersecurity Incident Shortfalls

For an organization to be resilient, key personnel must be acutely aware of their roles and ...

Read More