Loading...
Blogs & Stories

Trustwave Blog

The Trustwave Blog empowers information security professionals to achieve new heights through expert insight that addresses hot topics, trends and challenges and defines best practices.

3 Multi-Cloud Environment Challenges to Overcome

The list of obstacles security leaders experience to reach an ideal state of cyber resiliency in a multi-cloud environment is long, but important steps and decisions need to be made when it comes to the following three areas.

The Cybersecurity Maturity Model Certification: 5 Important Things to Know and Prepare For

The Department of Defense previously had an honor-system in place for contractors and subcontractors to meet cybersecurity compliance. This is all about the change with the introduction of the Cybersecurity Maturity Model Certification. Here are five important facts that you need to know and prepare for as the requirements are baked into RFIs and RFPs in 2020.

BEC Campaigns: Is Deepfake Tech a Cybercriminals Next Biggest Asset?

As business email compromise attacks continue to rise, impacting organizations across sectors, one can help but think what could be on the horizon as cybercriminals continue to leverage emerging technology. Here, we explore how deepfake technology may be a future asset for threat actors.

Embarking on a Hybrid SOC Journey

A discussion on the capabilities that would make a hybrid SOC partner most successful and key items organizations should focus on if they’re thinking of embarking on a hybrid SOC journey.

Misconfigurations: A Hacker’s Path of Least Resistance

Digital crooks won’t start off their attack campaigns by spending hours on developing custom file payloads or trojans. They’re looking for the path of least resistance, and most of the time, that’s by exploiting a misconfiguration in their target’s network.

Becoming Agile in Today’s Cyber Climate

Security organizations that embrace adaptive security are both agile when it comes to the threat landscape, but also continue to evolve proactively through the threat research and intelligence sharing it consumes. Here are steps you should take to point the security organization in the direction of becoming an agile and proactive function.

How to Minimize the Value of Your Database

Far too much information that either carries too little or too much value is stored in databases, making it difficult to manage at times from an information security standpoint. Trustwave Senior Product Manager Thomas Patterson discusses how security leaders can minimize the value in their databases and provides a good rule of thumb to follow when it comes time to decide what should and shouldn’t be kept in the database.

Overcoming Security Policy Management Hurdles in the Cloud

A single security policy that stretches across your multi-cloud environment won't cut it. Featuring expert advice from Trustwave's Senior Vice President of Managed Security Services, Chris Schueler, this interview provides approaches that will and won't work.

How to Build the Ideal SOC

Not every organization needs an in-house security operations center. But if yours is prepared to build one out, here are some thoughts and considerations to keep top of mind before you get started.

Stay Connected


Subscribe

Sign up to receive the latest security news and trends from Trustwave.

No spam, unsubscribe at any time.


Blog Categories


Trending Topics