What to Consider When It Comes to the GDPR and Consent

September 19, 2018

According to the General Data Protection Regulation (GDPR), an entity must have ...

Why Retail and Hospitality Businesses Need to Welcome Incident Readiness and Response

September 19, 2018

Let me tell you a story about a recent DFIR investigation I was fortunate ...

Why the GDPR is as Much of a Mind Shift as a Regulation

September 19, 2018 | Dixie Fisher

The General Data Protection Regulation (GDPR) affects all organizations that do ...

How to Better Navigate the Cybersecurity Product Maze

July 16, 2018 | Dan Kaplan

Of all the time sucks that security professionals face, arguably one of the ...

CISOs Are Already Awake at Night – But What Can You Do About It?

July 11, 2018 | Dan Kaplan

Scour the World Wide Web for articles on what keeps CISOs up at night, and ...

Two Challenging Areas Where Security Pros Are Making Strides

June 21, 2018 | Dan Kaplan

The recently released 2018 Security Pressures Report from Trustwave highlighted ...

Validating Your Payment Application: What You Should Know (Listen)

March 22, 2018 | Dixie Fisher

Johan Hagdahl, director of Trustwave global compliance and risk services, ...

Like Keeping a Car Running, Compliance Needs a Program and a Mechanic

February 22, 2018

Recently I took my car in for a service - that, in itself, isn't earth ...

Why NY State Financial Firms Should Consider a New Regulation the Floor, Not the Ceiling

February 15, 2018 | Matt Martin

As major milestone dates imposed by the pioneering and prescriptive New York ...

A CIO's Perspective on Moving to Managed Security

February 08, 2018 | Jane Bounds

A respected CIO in Australia recently came to us. He had been in the role for ...

7 Most Popular Trustwave Blog Posts of 2017

January 05, 2018 | Dan Kaplan

In a year that delivered a steady stream of breakdowns, tumult and facepalms to ...

3 Technology Developments That Are Disrupting Cybersecurity

December 13, 2017 | Dan Kaplan

Considering how easily prevention-centered security can be defeated, your ...

How Practicing Gratitude Can Connect to Improved Security

November 21, 2017 | Dan Kaplan

About five years ago, a spiritual friend encouraged me to start each day by ...

3 Big Reasons Why Cybercriminals Relish DDoS Attacks

November 08, 2017 | Dan Kaplan

When you think about cyberattacks and your business falling victim to one, ...

Q&A: How to Think Smarter About Database Security

October 04, 2017 | Jane Bounds

New laws across the world are placing the spotlight on data security and ...

How Hurricanes Stress the Security Lessons of Vulnerability and Risk

September 14, 2017 | Dan Kaplan

Even when all hell breaks loose in the world of information security, it has ...

Why Exploit Kits Are Going Dark

September 06, 2017 | Dan Kaplan

Three years ago, I devoted a blog post to the alarming uptick in exploit kit ...

What Does a Fileless Malware Attack Look Like?

August 15, 2017 | Dan Kaplan

Cybercriminals are hastening their use of methods and malware that are intended ...

How to Move Pen Testing Beyond Compliance

August 09, 2017 | Dan Kaplan

If you're on the right side of the law, yet you still believe that the solution ...

How to Grow and Master Your Security Playbook

August 02, 2017 | Dan Kaplan

There is an adage in sports that defense win championships. The premise behind ...

4 Security Trends Asia-Pacific Executives Should Fixate On

June 22, 2017 | Robert Pizzari

Our just-released Trustwave Global Security Report reveals significant ...

Why Ransomware Should Push You to Better Protect Your Databases

June 08, 2017 | Dan Kaplan

The global WannaCry ransomware outbreak helped steer much-needed mainstream ...

8 Reasons Why Businesses Say They Are Moving to Managed Security

June 01, 2017 | Dan Kaplan

Recently I heard from a CISO who described the state and mood of his IT ...

The Most Important Personality Traits of Gifted Security Leaders

May 03, 2017 | Dan Kaplan

Like other professions that are not fully understood by the rest of the ...

4 Industries Under Attack by Cybercriminals That May Surprise You

April 27, 2017 | Dan Kaplan

When you think of hot industry targets for cybercriminals, there are obvious ...

Why Merchant Service Providers Should Care About Transaction Laundering

April 20, 2017 | Alex Kaluski

You've seen it in the movies: Seemingly legitimate businesses such as ...

What to Make of Your Operational Security Pressures

April 19, 2017 | Dan Kaplan

When it comes to measuring the pressures you are under as an IT security ...

Get Wise to These 5 New Cybersecurity Laws

April 04, 2017 | Dan Kaplan

Laws are often passed when a situation becomes so dire that legislators feel ...