Organizations can’t just rely on diverse and cutting-edge technologies to fight adversaries. They will also need people with diverse expertise and backgrounds.
Telecoms company Sure has joined forces with a firm fighting the threat from cybercrime. The company is called Trustwave.
Hackers are targeting credit cards online more, a new report found. The number of cards being targeted went up by 7 percent, according to Trustwave’s global security report.
Given much of the publicity that is routinely attached to every breach disclosure these days, it’s easy to be pessimistic about the overall state of cybersecurity.
Gartner’s Magic Quadrant 2019 for managed security services providers (MSSPs) has surfaced. Here’s a look at each MSSP featured in the report, along with our perspectives on each cybersecurity business.
You may have business relationships with an internationally located vendor, supplier, provider, contractor, employee, or customer. You may have boosted cybersecurity in your network. Be vigilant, attackers can use your business relationships as stepping-stones into your network.
The White House says there are over 300,000 cybersecurity job vacancies in the United States and believes it’s crucial for the country’s economy and security that these jobs are filled.
Trustwave is introducing a new database security scanning and testing software that helps organizations better protect critical data assets hosted on-site or by major cloud service providers.
This in-depth report from Trustwave contains a number of useful suggestions that sites can consider for a defense-in-depth approach to combating an increasingly crowded field of criminal groups turning more of their attention toward stealing CVV data.
Trustwave, a Top 100 MSSP, has introduced the DbProtect database security scanning and testing software. DbProtect provides data visibility and protection and compliance management capabilities, according to Trustwave.
The 2019 Trustwave Global Security Report, released on April 25, has its fair share of bad news as it has found that multiple types of attacks have grown and attackers have continued to increase levels of sophistication.
Cyber criminals are attacking more accounts in the Asia Pacific region than North America, representing 35 percent of investigated data compromises, according to the annual report out today by Trustwave.
The time it takes to detect the average cyberattack has shortened, but cyberattackers are now using more subtle techniques to avoid better defenses, a new study of real incident response engagements shows.
Trustwave, which offers Managed Detection and Response (MDR) services, has taken a number of steps to build stronger context into their operations. They are feeding data about known bad actors into their intel fusion platform (IFP).
A spam campaign pushing the info-stealing LokiBot trojan leverages a novel technique to avoid detection. According to researchers, the spam messages include malicious .zipx attachment hidden inside a .PNG file that can slip past some email security gateways.
The CIA extortion scams continue to evolve in order to squeeze as much money out of a victim as they can. In a new variant discovered by researchers, the extortion emails are now selling alleged proof on Satoshi Box for $500 that show you are part of the CIA investigation.
Lawrence Munro, worldwide vice president of Trustwave SpiderLabs, on active threat hunting and what it takes to become a red teamer.
Hackers modified a Pakistani government website where citizens can request passports to spy on its visitors, according to researchers at Trustwave.
In his role leading penetration testing services at Trustwave, Lawrence Munro, VP SpiderLabs, has pulled together the attributes, experience and qualifications he considers necessary to crack a career in this challenging space.
It’s more important than ever for cybersecurity professional to understand how attackers can gain access to sensitive company or customer data. While it’s still important to examine vulnerabilities in isolation, the ability to understand attack paths and how attackers can gain access to data.
Sign up to receive the latest security news and trends from Trustwave.