Showing 41 results for: 2013 ×

12 of the biggest things Trustwave did in 2013

This past year was an eventful one for Trustwave – as it was for the entire information security industry. As data breaches rolled on, malware advanced and compliance requirements stiffened, Trustwave responded with updated products and services, stronger-than-ever intelligence and expertise, and unwavering curiosity.

Two million stolen passwords: How to protect yourself

This week Trustwave security researchers uncovered a criminally controlled web server that contains nearly two million stolen account usernames and passwords for many popular sites, including Facebook, Twitter, LinkedIn, Google and Yahoo. Over the past few days, news outlets worldwide have reported on the discovery, and many people, including our customers, have questions about the malware, its impact and how they can protect themselves.

6 Tips to jumpstart your PCI DSS 3.0 compliance

The PCI Security Standards Council officially has released the 3.0 version of the PCI DSS standard. Businesses have plenty of time to begin assessing their data security practices against these updated and new rules, but for many, this will require some work.

We are adding to our mantle

We've got some great news to share! Trustwave recently received the “Network Access Control Solution of the Year” award at the 2013 Computing Security Awards ceremony, held recently at Hotel Russell in London.

8 things to know about PCI DSS 3.0

Version 3.0 of the Payment Card Industry Data Security Standard (PCI DSS) is due to be published on Nov. 7. That may send shivers down your spine, but the reality is, as technology advances and threats evolve, payment security requirements need tweaking.

Toilet hacks: More relevant to enterprise security than you might think

As we call a wrap on another busy conference season, I've had some time to think about a question I've recently heard from more than one person. Last month, news outlets far and wide reported on an entertaining presentation one of our researchers did on hacking home automation devices, including, funnily enough, Japanese “smart” toilets. It was a fun piece of vulnerability research, but the natural question that came from all of the publicity was what the heck does hacking a flushable bowl have to do with enterprise security?

How to Proactively Protect Web Applications

Web applications are critical to business operations these days - serving as an important revenue channel and as a significant customer touch point. But what we don't know is that they bring a level of unexpected exposure - becoming the preferred attack vector for hackers.