Breaking Out of the Vicious Cycle of Ransomware Attacks

January 04, 2022 | Ed Williams

Ransomware has quickly become one of the most prevalent cyber threats facing ...

Preparedness, Speed and Communication are the Cornerstones of a Solid Ransomware Defense

December 16, 2021 | Darren Van Booven

Ransomware attackers today have the technical skill and tools to analyze a ...

MDR Provider, MSSP or Both? Focus on the Capabilities You Need

November 22, 2021

Over the last several years, Managed Security Service Providers (MSSP) have ...

Cybersecurity in the Year Ahead: The Trustwave 2022 Cybersecurity Predictions

November 18, 2021

In 2021, the cybersecurity industry was truly tested. Most notably, we ...

The Importance of Speed During Detection and Response: Iranian-Backed Hackers Targeting U.S. Companies with Ransomware

November 17, 2021 | Darren Van Booven

Iranian government-sponsored advanced persistent threat (APT) actors are ...

Europol Operation Targets Ransomware Operators

November 04, 2021 | Doug Olenick

Europol, the European Union’s law enforcement agency, on Oct. 26, targeted 12 ...

Mitigating Increasingly Serious and Sophisticated Ransomware Threats

October 15, 2021 | Ed Williams

October is Cybersecurity Awareness Month, and so now is the perfect time for a ...

NSA and CISA Issue Release Guidance on Proper VPN Deployment

October 07, 2021 | Doug Olenick

This week, the National Security Agency and the Cybersecurity and ...

Cybersecurity Basics: Determining Your Vulnerability Testing Needs

September 22, 2021

When it comes to maintaining a strong organizational security posture, ...

Singapore Companies Faced With the Threat of Sophisticated Ransomware Attacks. Is Your Company Prepared?

September 13, 2021

Cyber-attacks have intensified in the last eight months of 2021. The Straits ...

The 10 Principles of Database Security

August 25, 2021

Best Practices to Stay Ahead of Hackers and Secure Your Critical Data

Managing Supply Chain Cyber Risk: Know What You Control – and Detect What You Don’t

August 04, 2021 | Nick Ellsmore

As we announce Managed Vendor Risk Assessment (MVRA), a first-of-its-kind cyber ...

The Top Cybersecurity Best Practices for Manufacturing Companies To Follow During the Height of Ransomware

July 20, 2021 | Darren Van Booven

Today’s manufacturing industry is straddling a line between traditional, legacy ...

Trustwave 2021 Network Security Report Shows How Threats Have Evolved in a Remote Workforce World

July 12, 2021

The COVID-19 pandemic created enormous challenges for businesses worldwide – ...

How Diversifying Your Cybersecurity Team Can Help You Combat the Cyber Skills Shortage

June 03, 2021 | Nick Ellsmore

What if the current handwringing around a cyber skills shortage was overdone? ...

Trustwave 2021 Email Threat Report Highlights Critical Trends in Email Security in the Age of Advanced Threats

May 19, 2021

Most mature organizations have recognized the importance of email security and ...

Colonial Pipeline Attack Spotlights the Importance of Ransomware Preparedness

May 11, 2021

We’re sure you’ve seen the news on the latest ransomware attack on Colonial ...

How Your Security Testing Mindset Should Change After COVID-19

May 04, 2021 | Mark Whitehead

As states move toward gradually lifting restrictions and allowing people to ...

Know Your Enemy: Leveraging the Dark Web to Strengthen Security

April 07, 2021 | Trustwave SpiderLabs

Virtual, underground marketplaces operating on the Dark Web generate billions ...

How I Hacked A Nuclear Power Plant

March 03, 2021

In cybersecurity, the worst-case scenario is that malicious hackers might gain ...

Discussing the SolarWinds Discovery

February 09, 2021

With its recent discovery of three new vulnerabilities in SolarWinds products, ...

Discussing the Go SMS Pro Discovery

December 09, 2020

What if the messenger app that you were using was not only exposing your data ...

How Much Risk Is Hiding in Your Organization’s Internet of Things (IoT)?

July 30, 2020

As the “internet of things,” commonly known as IoT, matures and grows every ...

Discussing What Security Testing Is and Will Be

June 24, 2020

Since cyber-attacks are constantly evolving, security testing needs to evolve ...

Using Microsoft 365? Why Complementary Security Tools are Essential

June 05, 2020

Many enterprise organizations use Office 365 (recently renamed Microsoft 365) ...

Spotlight on Trustwave SpiderLabs, Part 2: Incident Response and Threat Hunting

May 29, 2020

This two-part article will introduce and provide an overview of the SpiderLabs ...

Spotlight on Trustwave SpiderLabs, Part 1: Proactive Threat Intelligence

May 22, 2020

This two-part article will introduce and provide an overview of the SpiderLabs ...

Database Security: Your Organization’s Last Line of Defense

May 12, 2020

Every company has data they use to run their business, whether it’s personal ...