LevelBlue Completes Acquisition of Trustwave to Form the World's Largest Pure-Play MSSP.  Learn More

LevelBlue Completes Acquisition of Trustwave to Form the World's Largest Pure-Play MSSP.  Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Microsoft Security
Unlock the full power of Microsoft Security
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
circles-2-nr

Media Coverage

Trustwave Media Coverage chronicles news articles and TV spots featuring commentary and insights from our experienced experts and enlightening studies.

IT Brief Australia

Gartner Magic Quadrant for Managed Security Services 2018: Analysis

December 23, 2018

So what’s new for 2018? Trustwave moved into the enviable Leaders Quadrant, while Capgemini, DXC Technology and Fujitsu were added to the overall rankings.

Siliconrepublic

Unpatched Kernel-Level Vuln in IBM Security Tool for Apple MacOS Revealed

December 21, 2018

Researchers disclose signedness bug in driver used by IBM Trusteer Rapport endpoint security tool after IBM fails to deliver timely patch.

HelpNetSecurity

Gift Cards Make Popular Gifts Targets for Scammers

December 21, 2018

Gift cards are popular gifts this time of year, but they’re also big targets for theft. Americans have spent almost $30 billion on gift cards this holiday season but have also lost more than $50 million so far this year in gift card-related scams, according to the Federal Trade Commission.

Security Week

Dark Web Recruitment: In the Web’s Lawless Underbelly There are Still Rules

December 07, 2018

What we see when we browse the web is just the tip of the iceberg. Hidden below the surface, accessible only by the Tor browser, exists a marketplace in which criminals can sell drugs, weapons and stolen data with relatively little surveillance.

Forensic Magazine

60 Cybersecurity Predictions for 2019

December 03, 2018

Just like last year, this year’s 60 predictions reveal the state-of-mind of key participants in the cybersecurity industry (on the defense team, of course) and cover all that’s hot today.

SC Media

The SOC Essentials for 2019

November 21, 2018

What are the key differences between building a SOC for a large enterprise vs. for a small to midsized organization? Trustwave's Kory Daniels explains the distinction and outlines the must-have skills.

CSO

Hackers Infect Make-A-Wish Foundation Website With Code That Generates Cryptocurrency

November 20, 2018

Hackers successfully broke into the international website of the Make-A-Wish Foundation and inserted malicious computer code which used the computers of people visiting the site to generate cryptocurrency.

The Business Times

Hacker Brief: Criminals With No Shame Hit Make-A-Wish Website

November 19, 2018

Over the last year or so, cryptojacking—which forces your computer to mine cryptocurrency for bad guys when you visit an infected site—has become one of the internet’s most pervasive scourges.

Channel Partners

How to Train Your Team (and Organization) to Effectively Use Threat Intelligence

November 13, 2018

Threat intelligence has transformed the information security world for the better but it’s not always leveraged in the best way possible by organizations and departments. The sheer amount of information, providers, platforms, and types of threat intelligence and data available, make it difficult to confidently ensure an organization is making the most of their threat intelligence.

Dark Reading

Ransomware Infection? Here’s How You Control the Damage

November 12, 2018

Eighteen months ago, ransomware hit headlines around the world with the WannaCry and Petya outbreaks which spread across 150 countries. While lower attack volume may suggest that file-encrypting ransomware is no longer a risk, that’s not the case.

CBS Chicago

Five Key Considerations when Developing a Security Operations Center

November 08, 2018

Ensuring access to a reliable feed of threat intelligence through a security operations center (SOC) is an essential element of many organization’s security strategy today. However, establishing a SOC is a complicated endeavor, particularly when it comes to balancing budget and resource limitations in an increasingly complex security landscape.

TechBeacon

Why is Burnout so Prevalent in the Cybersecurity Industry?

November 07, 2018

A role in cybersecurity, while rewarding, can also be extremely taxing psychologically. We spoke to Chris Schueler from Trustwave about why burnout is so prevalent and how it can be addressed.

TechRadar

Red Alert Android Trojan for Rent at $500 Per Month

November 05, 2018

The Red Alert 2.0 Android Trojan first detailed in September last year is currently available for rent on underground forums at $500 per month, Trustwave reports.

CNBC

Virtual Case Notes: 10 Years After Fighting Conficker Exploit Security Researcher Reflects

October 26, 2018

As the last full week of the 15th National Cybersecurity Awareness Month comes to a close, security experts are reflecting on the 10-year anniversary of one of the most significant computer vulnerabilities and cyberattacks of the time.

InfoSec Insider

Like it or not Business Must Swallow TLS Deprecation Medicine

October 18, 2018

In coordinated statements, the big four in the browser application world have finally announced the deprecation of Transport Layer Security (TLS) protocol v1.0 and v1.1.

Crain’s Chicago Business

Singtel to Buy Australian Cyber Security Firm for A$23.3 Million

October 10, 2018

Singtel’s Australian subsidiary has inked a deal to buy a privately held cyber security firm incorporated in Victoria state, which will be integrated into the group’s Trustwave cyber security arm.

Chicago Tribune

Top Cybersecurity Facts Figures and Statistics for 2018

October 10, 2018

Looking for hard numbers to back up your sense of what’s happening in the cybersecurity world? We dug into studies and surveys of the industry’s landscape to get a sense of the lay of the land – both in terms of what’s happening and how your fellow IT pros are reacting to it.

Transaction Trends

AVANT Trustwave Partner to Increase Security Sales in The Channel

October 09, 2018

AVANT Communications has forged an alliance with Trustwave, an MSSP that helps businesses fight cybercrime, protect data and reduce risk. The alliance gives AVANT’s thousands of channel sales professionals access to Trustwave’s portfolio of managed security services covering threats, vulnerabilities and compliance.

BBC

Inside the Dark Web’s ‘Help Wanted’ Ads

October 08, 2018

How cybercriminals recruit everyone from car drivers to corporate insiders and pay them according to the risk they assume.

Threatpost

Signed Check Used to Take $4500 from Couple’s Account

October 03, 2018

A year ago, one couple wrote a check for $625. Then, someone tried to deposit more than a dozen other checks worth around $20,000 using that original signed check as their counterfeit canvas. CBS 2’s Dorothy Tucker investigates how that can happen.

SC Media

How to Defend Enterprise Apps with Threat Modeling: 4 Lessons Learned

October 02, 2018

Security experts have long recommended that security teams incorporate threat modeling into their process of analyzing their corporate assets. Taking a structured approach to analyzing risks to information infrastructure can reveal new threats that aren’t contained in compliance requirements or industry standards.

CSO Australia

PureVPN Windows Client Leaked Passwords

September 27, 2018

PureVPN has had two vulnerabilities which would allow hackers to retrieve stored passwords through the VPN client. This was confirmed by Trustwave’s research and the VPN provider itself.

The Verge

There’s a Booming Job Market for Corporate Insiders Willing to Share Secret Info with Cyber Criminals

September 20, 2018

Many companies, especially in big technology, banking and telecom, face heavy incentives overseas for employees to sell internal information or access. The problem is so common that in some jurisdictions, criminal enterprises post “job ads” looking for specific insiders to aid in targeted schemes.

Forbes

A Look at the Windy City’s Newest Cyber Command Center

September 18, 2018

Ask anyone what a quintessential cybersecurity command center looks like, and they’ll likely launch into a description that includes a dark room with vibrant accent lighting and a collection of screens displaying an array of information from global news to maps highlighting real-time cyberattacks.

Forbes

How Trustwave Keeps an Eye on Hackers

September 12, 2018

Look inside the Loop command center where the information-security company is stepping up its cybersecurity game.

ZDNet

Threat Hunters and Ethical Hackers: Trustwave’s Chicago Command Center Battles Cybercriminals

September 12, 2018

Scrolling down a jumbo screen Trustwave’s Loop office is a list of personal information. There are emails, names, passwords, credit card numbers and expiration dates – a gold mine for anyone trying to steal someone’s identity.

Dark Reading

The Secrets of Social Engineering

September 06, 2018

We’ve all heard the stories in the news about cyberattacks enabled by unwitting consumers: fraudsters hacking into individuals’ email accounts and sending messages to their contacts requesting money; consumers providing payment information to phony websites; cybercriminals pretending to be relatives “in urgent needs of funds.”

ZDNet

Unpicking the Cyber-Crime Economy

August 26, 2018

Turning virtual cash into real money without being caught is a big problem for successful cyber-criminals. They often have to get creative when “cashing out” or laundering the money they have stolen, according to a security expert.

The Register

Cross-Site Scripting Flaw in Apache ActiveMQ Threatens Web Visitors

August 24, 2018

Researchers have found a cross-site scripting (XSS) flaw in Apache ActiveMQ that could enable a remote attacker with no privileges to launch an array of attacks against visitors to compromised websites.

ZDNet

Thought Leader – Chris Schueler

August 23, 2018

At a time when cyberattacks and threats are on a sharp rise both in frequency and severity, Chris Schueler has been a driving force in shaping how large organizations incorporate the managed security model.