Tabletop Exercises: The Key to Recovering From a Devastating Cyberattack

The exploitation of the CitrixBleed vulnerability in Netscale by a variety of ransomware groups has ...

Read More

Defending Against ChatGPT-Enhanced Phishing with Managed Detection and Response

Phishing, already a serious, ever-present threat, is getting even more pernicious thanks to ...

Read More

Managing Risk Appetite: Balancing Cybersecurity and Business Growth

Determining, dealing with, and accepting a certain level of risk will always be a top priority for ...

Read More

Final Cybersecurity Awareness Month Thoughts: Don't Get Hooked By a Phishing Email

We close out Cybersecurity Awareness Month for 2023 with a few final points that show that a ...

Read More

How a Database Risk Assessment Reduces the Risk of a Cyberattack

Database security often, and to an organization's detriment, falls between the cracks as security ...

Read More

Strong Passwords and MFA: Two Easy Fixes to Enhance Your Cybersecurity Posture

As 2023 Cybersecurity Awareness Month continues, let's look at a couple of the areas the ...

Read More

Focus on these 3 Areas to Develop a Strong Cybersecurity Posture With Fewer Resources

Not every organization's security apparatus is built or funded at the same level. For smaller ...

Read More

10 Dynamic Principles for Crafting a Robust Database Security Strategy

The digital world relies on data, which because of its considerable value, is constantly targeted ...

Read More

The Beauty of a Red Team Exercise: When One Discovery Leads to Potentially Saving Lives

What started out as a standard Red Team test designed to check the security capabilities of several ...

Read More

How Trustwave Uses Enterprise Penetration Testing to Fortify a Client's Defensive Posture

Anyone who has played a Tower Defense-style game, (Plants Vs. Zombies being a favourite) knows the ...

Read More

Maximising Your Microsoft Security Environment

If you're a Microsoft-focused organization you may be able to leverage the technology you already ...

Read More

9 Steps to Protect Against the Next MOVEit/MFT Attack

By now, the facts of the recent MOVEit breach are well known (although the victim total keeps ...

Read More

How to Build a More Secure and Resilient Supply Chain

For threat actors looking to create widespread damage, attacking a third-party supplier with ...

Read More

Attack Surface Management: Challenges, Myths, and Solutions

In the modern era of interconnectedness and digitalization, the risk of cyber threats has increased ...

Read More

Stopping Threat Actors from Gaining Initial Access

The recent Trustwave SpiderLabs report, Cybersecurity in the Healthcare Industry: Actionable ...

Read More

Offensive Security and the Misconceptions Surrounding Enterprise Penetration Testing

The concept of Offensive Security is often misunderstood by clients who often confuse it with ...

Read More

Recruiting and Retaining Women Talent in Cyber Amidst the Cyber Shortage

With more than 2.5 million cybersecurity positions unfilled globally, the cybersecurity field is ...

Read More

Safeguarding Patients' Personal Health Information: 7 Steps to Achieving HIPAA Compliance with Trustwave DbProtect

The Health Insurance Portability and Accountability Act, best known as HIPAA, is one of the most ...

Read More

Part 2: Preparing the Board of Directors for the SEC's Upcoming Cybersecurity Compliance Regulations

In March 2022, the U.S. Securities and Exchange Commission (SEC) issued a proposed rule, the ...

Read More

Preparing the Board of Directors for the SEC’s Upcoming Cybersecurity Compliance Regulations

In March 2022, the U.S. Securities and Exchange Commission (SEC) issued a proposed rule, the ...

Read More

Security Awareness 101: Creating a Compelling Security Awareness Program

There is no downside for an organization to have a security awareness program in place. It may not ...

Read More

Top 5 Ways Cybercriminals Engage in Credential Harvesting: Protecting Your Login Credentials

In today's digital world, login credentials are the keys to the kingdom. Whether it's your online ...

Read More

Don’t Let Complicated RFP Problems Slow Down Your Business

Trustwave is one of the finest pure-play cybersecurity companies in the business, capable of ...

Read More

Properly Explaining Risk Appetite to the C-Suite

In the first part of this series, we looked at some common issues when a Chief Information Security ...

Read More

How Co-Managed SOC Helps Derive Maximum Value from Your SIEM Investment

Security information and event management (SIEM) systems are crucial to cyber security, providing a ...

Read More

How to Avoid Common Cybersecurity RFP Pitfalls: Part 1

At Trustwave, we see scores of requests for proposal (RFP) in all shapes and sizes, originating ...

Read More

How Advanced Continual Threat Hunting Takes MDR and Cybersecurity to the Next Level

When researching which managed detection and response (MDR) service provider to partner with, ...

Read More

6 Tips Any CISO Can Use to Inform their Organization’s Executives on Cybersecurity

A Chief Information Security Officer is a person who is always in a tough spot. Not only is a CISO ...

Read More