Showing 6 results for: July 2014 ×

Sandboxes May Not Be Much Fun for Your Network

Sandboxing technology operates with a fundamental flaw: A company must first be infected before any action can be taken. In contrast, anti-malware technology can assess and block zero-day exploits, targeted attacks and advanced persistent in real time.

What You Can Buy for the Same Cost as Malware

Did you know that a new smartphone costs less than a remote access Trojan? It's true. The price of malware on the black market has dipped so low that it rivals many of the common consumer goods and services we buy every day. That’s bad news for businesses that need to defend against malware-induced data theft. This new infographic will illustrate just how affordable malware is.

5 Reasons to Go Beyond HIPAA Compliance

When it comes to HIPAA compliance, many organizations are only interested in what they need to do to appease the auditor. But in a sophisticated threat environment, that mindset can invite complacency and trouble. Here are five reasons why health care entities should go beyond HIPAA and place a deeper focus on security.

A Simple Strategy to Make Life Harder for Hackers

With weak passwords contributing to nearly a third of the data breaches Trustwave investigated in 2013, organizations must seek out additional modes of defense against credential-stealing and credential-exploiting attackers. When delivered as cloud and managed based, two-factor authentication is a useful and simple method that can protect both internal and external assets.

Trustwave NAC Receives International Seal of Approval

In the age of mobility, employees expect always-on access to data and the corporate network. But as the traditional perimeter erodes by the day, companies require technology that provides constant monitoring and visibility of devices trying to connect. Trustwave Network Access control manages that requirement for organizations. And to prove the value of our NAC offering, we've just received Common Criteria certification.