Breaking Out of the Vicious Cycle of Ransomware Attacks
January 04, 2022 | Ed Williams
Ransomware has quickly become one of the most prevalent cyber threats facing ...
Preparedness, Speed and Communication are the Cornerstones of a Solid Ransomware Defense
December 16, 2021 | Darren Van Booven
Ransomware attackers today have the technical skill and tools to analyze a ...
MDR Provider, MSSP or Both? Focus on the Capabilities You Need
November 22, 2021
Over the last several years, Managed Security Service Providers (MSSP) have ...
Cybersecurity in the Year Ahead: The Trustwave 2022 Cybersecurity Predictions
November 18, 2021
In 2021, the cybersecurity industry was truly tested. Most notably, we ...
The Importance of Speed During Detection and Response: Iranian-Backed Hackers Targeting U.S. Companies with Ransomware
November 17, 2021 | Darren Van Booven
Iranian government-sponsored advanced persistent threat (APT) actors are ...
Europol Operation Targets Ransomware Operators
November 04, 2021 | Doug Olenick
Europol, the European Union’s law enforcement agency, on Oct. 26, targeted 12 ...
Mitigating Increasingly Serious and Sophisticated Ransomware Threats
October 15, 2021 | Ed Williams
October is Cybersecurity Awareness Month, and so now is the perfect time for a ...
NSA and CISA Issue Release Guidance on Proper VPN Deployment
October 07, 2021 | Doug Olenick
This week, the National Security Agency and the Cybersecurity and ...
Cybersecurity Basics: Determining Your Vulnerability Testing Needs
September 22, 2021
When it comes to maintaining a strong organizational security posture, ...
Singapore Companies Faced With the Threat of Sophisticated Ransomware Attacks. Is Your Company Prepared?
September 13, 2021
Cyber-attacks have intensified in the last eight months of 2021. The Straits ...
The 10 Principles of Database Security
August 25, 2021
Best Practices to Stay Ahead of Hackers and Secure Your Critical Data
Managing Supply Chain Cyber Risk: Know What You Control – and Detect What You Don’t
August 04, 2021 | Nick Ellsmore
As we announce Managed Vendor Risk Assessment (MVRA), a first-of-its-kind cyber ...
The Top Cybersecurity Best Practices for Manufacturing Companies To Follow During the Height of Ransomware
July 20, 2021 | Darren Van Booven
Today’s manufacturing industry is straddling a line between traditional, legacy ...
Trustwave 2021 Network Security Report Shows How Threats Have Evolved in a Remote Workforce World
July 12, 2021
The COVID-19 pandemic created enormous challenges for businesses worldwide – ...
How Diversifying Your Cybersecurity Team Can Help You Combat the Cyber Skills Shortage
June 03, 2021 | Nick Ellsmore
What if the current handwringing around a cyber skills shortage was overdone? ...
Trustwave 2021 Email Threat Report Highlights Critical Trends in Email Security in the Age of Advanced Threats
May 19, 2021
Most mature organizations have recognized the importance of email security and ...
Colonial Pipeline Attack Spotlights the Importance of Ransomware Preparedness
May 11, 2021
We’re sure you’ve seen the news on the latest ransomware attack on Colonial ...
How Your Security Testing Mindset Should Change After COVID-19
May 04, 2021 | Mark Whitehead
As states move toward gradually lifting restrictions and allowing people to ...
Know Your Enemy: Leveraging the Dark Web to Strengthen Security
April 07, 2021 | Trustwave SpiderLabs
Virtual, underground marketplaces operating on the Dark Web generate billions ...
How I Hacked A Nuclear Power Plant
March 03, 2021
In cybersecurity, the worst-case scenario is that malicious hackers might gain ...
Discussing the SolarWinds Discovery
February 09, 2021
With its recent discovery of three new vulnerabilities in SolarWinds products, ...
Discussing the Go SMS Pro Discovery
December 09, 2020
What if the messenger app that you were using was not only exposing your data ...
How Much Risk Is Hiding in Your Organization’s Internet of Things (IoT)?
July 30, 2020
As the “internet of things,” commonly known as IoT, matures and grows every ...
Discussing What Security Testing Is and Will Be
June 24, 2020
Since cyber-attacks are constantly evolving, security testing needs to evolve ...
Using Microsoft 365? Why Complementary Security Tools are Essential
June 05, 2020
Many enterprise organizations use Office 365 (recently renamed Microsoft 365) ...
Spotlight on Trustwave SpiderLabs, Part 2: Incident Response and Threat Hunting
May 29, 2020
This two-part article will introduce and provide an overview of the SpiderLabs ...
Spotlight on Trustwave SpiderLabs, Part 1: Proactive Threat Intelligence
May 22, 2020
This two-part article will introduce and provide an overview of the SpiderLabs ...
Database Security: Your Organization’s Last Line of Defense
May 12, 2020
Every company has data they use to run their business, whether it’s personal ...