Why SIEM Has Failed So Many – And What You Can Do About It

Organizations worldwide are well past the point of believing that perimeter-based defenses are all ...

Read More

Neglect These 'Second-Tier' Vulnerabilities at Your Own Risk

By now you should be familiar with the "mega" vulnerabilities that were assigned splashy monikers ...

Read More

What Garlic Has To Do with Information Security

I like garlic. I really do. But somewhere along the way, the pungent herb seemed to cross over from ...

Read More

What You Can Learn from the Ridiculous Money That Cybercriminals Make

Statistics abound regarding the cost businesses bear due to attacks and breaches, but arguably just ...

Read More

7 Rookie Security Mistakes Made by Health Care Organizations

Health care entities often operate several steps behind criminal hackers and other data thieves. ...

Read More

Why You Should Be Losing Sleep over the Security Skills Shortage

We've written a few times in this space about the seemingly ineradicable security skills shortage ...

Read More

7 Unromantic Security Comments That Could Ruin Valentine's Day

If you're out with that special someone this Valentine's Day weekend, and he or she happens to be ...

Read More

4 Undeniable Reasons to Take Your Email Security to the Cloud

A clear progression has taken shape in information security. As organizations of all sizes have ...

Read More

Why it's the Perfect Time for a Security Intervention

2014 was a year of reckoning for IT and security professionals globally. Like never before, the ...

Read More

How Trustwave Can Help You Get Secure (And PCI 3.0 Compliant in the Process)

Starting Jan. 1, any business that stores, processes or transmits payment card data must comply ...

Read More

A Simple Fix for the Cybersecurity Skills Shortage

Data breaches are earning front-page headlines on a near-daily basis, yet many companies across ...

Read More

4 Scary Truths We Observed During National Cyber Security Awareness Month

Friday is Halloween - and the ghosts and goblins will be out in full force in search of chocolate ...

Read More

6 Technologies That Will Expand Your Anti-Malware Arsenal

Read More

Why Preventing Retail Breaches Requires a Team Effort

2014 is very much shaping up as the Year of the Retail Breach - nary a week goes by in which we ...

Read More

Yes, Your Password is Easy to Crack

Earlier this year, we told you about a password analysis we conducted on the Pony botnet, a ...

Read More

Sandboxes May Not Be Much Fun for Your Network

While products that implement sandboxing techniques can detect zero-day malware, targeted attacks ...

Read More

5 Reasons to Go Beyond HIPAA Compliance

With the next 12 months promising to bring "especially aggressive punishment" of violations under ...

Read More

A Simple Strategy to Make Life Harder for Hackers

In 2004, Bill Gates predicted that the death of the password was imminent. Yet, a decade later, ...

Read More

3 Warning Signs You May Be Drowning in Apps and Placing Security at Risk

Web, mobile and cloud applications are insanely popular - both from an end-user consumption ...

Read More

Despite All of the Breaches, Why Aren't Passwords Getting Any Stronger?

Security companies like ours offer an assortment of technologies and services that organizations ...

Read More

3 Application Lifecycle Phases You Must Security Test

Data breaches are no joke. Incidents involving the loss or exposure of sensitive information can ...

Read More

Why 'Comprehensive' Application Security Is More Important Than Ever

Ask an IT person why they scan certain applications for vulnerabilities, and they'll most often ...

Read More

March Madness? More like March Malware-ness

We know March Madness is here because our phones are ringing with security leaders on the other ...

Read More

Has Cyber Security Awareness Improved Among the Largest U.K. Businesses?

In November 2011, the U.K. government launched its Cyber Security Strategy in hopes of placing the ...

Read More

How to Design a Defense Against Point-of-Sale Malware Attacks

Despite increasingly tighter data protection standards, more advanced security technology and ...

Read More

How to Prepare for the Incoming Wave of HIPAA Audits

I joined some colleagues from Trustwave last week in Orlando, Fla. for HIMSS14, one of the nation's ...

Read More

How to Survive After Windows XP Dies

"The art of dying graciously is nowhere advertised, in spite of the fact that its market potential ...

Read More

At Trustwave, we're thankful for each other and that we get to help you

Humans spend a significant portion of their lives at work. I won't burden you with the statistics ...

Read More