As a managed security services provider (MSSP), you are expected to be right all of the time. A malicious attacker only has to be right once to successfully break into an organization's environment. This means that having world-class operations with rich, timely threat intelligence is absolutely critical to the success of a top MSSP.
What if the current handwringing around a cyber skills shortage was overdone? What if the problem facing cybersecurity isn’t the lack of the right training or the correct academic degree, but the failure to apply the best lens through which to assess those entering the field?
The cybersecurity threat landscape is continuously evolving, with the frequency and impacts of threats like malware and ransomware increasing every year. Today, organizations of all sizes and in every industry sector must be proactively searching for emerging threats and actively monitoring risk to protect themselves – and respond quickly in the event that a threat is identified. Amid this challenging threat landscape, organizations are struggling to find enough cybersecurity professionals to staff their teams. Globally, there is a cybersecurity worker shortage of nearly 4 million. So how can companies undertake proactive threat detection and response during a vast skills shortage?
In the new 2021 Email Threat Report from Trustwave, we break down real-life examples of the latest email threats and critical trends from the past year to help you gain an understanding of the current landscape so you can prepare your email security strategy.
You may have heard the news. Trustwave was recently named a finalist in Palo Alto Networks’ Professional Services Awards for Customer Excellence.
In one of the most high-profile attacks on critical infrastructure in recent years, operations at the company were shut down on May 7 after a hacker group, now identified as DarkSide by the FBI, launched a ransomware attack against the organization in an attempt to extort millions of dollars.
Password security has become even more critical in the age of remote work. With more corporate devices online and more new user account creation than ever before, strong passwords take center stage as one of the first lines of defense against hackers.
Security teams must start preparing now for the ways security testing will need to be different when people start returning to the office and businesses ramp up.
Utilizing the cloud in some capacity for your organization’s infrastructure – whether hybrid or public – has immense benefits.
Most of you that are familiar with Secure Email Gateway products know the MailMarshal name and know that its name was changed to Trustwave Secure Email Gateway almost ten years ago when Trustwave acquired M86 Security. Over the years, MailMarshal, known for its email threat protection and detection accuracy, continues to be recognized by many across the industry and has retained a decades-long and loyal client base.
COVID-themed phishing attacks surged more than 40 percent in the early months of the pandemic and an estimated $100 million in COVID-related goods and services were offered for sale,
According to IDC, in 2020, 64.2 zettabytes (ZB) of data was created or copied due to the increase in rich data exchanges and remote working during the COVID-19 pandemic. IDC also predicts that the amount of data created over the next five years will be greater than twice the amount of data created since the advent of digital storage.
Trustwave was named a Strong Performer and one of the top 9 "Providers That Matter Most" to clients in terms of current capability in the first-ever Forrester Wave for Managed Detection and Response (MDR). Trustwave is also recognized in the Q3 2020 Forrester Wave for Global Managed Security Services Providers as a market leader in "Strength of Current Offering for MSSPs" – positioning us to strongly execute in the pure-play MDR market and, with our leadership in MSS, excel in crossover MDR/MSS service offerings.
Hundreds of thousands of organizations are reported to have been affected by the Microsoft Exchange Server attacks. HAFNIUM, an advanced threat actor group assessed to be state-sponsored, and numerous other threat actors across the globe have been attacking organizations by exploiting critical zero-day vulnerabilities in Microsoft Exchange Servers.
As the world celebrates International Women’s Day, it’s an unfortunate reality that cybersecurity, like many other industries, is often thought of as a male dominated field. Despite the obstacles, many female cybersecurity professionals are breaking barriers and setting new precedents, like the 5 amazing women interviewed here.
While most of us assume – or at least hope – that nuclear power plants are hardened targets that should be protected by the most advanced digital security possible, is that actually the case? In this interview with Charles Hamilton, Principal Security Consultant for Trustwave SpiderLabs, we discuss his experience conducting a penetration testing exercise for a nuclear power plant.
COVID-19 has been disrupting CISO’s cybersecurity programs and changing their priorities. While no one knows when the coronavirus impact will end, although the recent vaccine developments have given us all some hope, we are getting a good perspective on what the new normal will look like – but I am going to talk to 4 key stages in the transformation to a new resilient digital nomad way of workers lives. But what will it change?
Many organizations have rushed to a remote working environment, with no time to prepare and plan a secure course of action, which inevitably leads to gaps in security – and we’ve seen this happen. Clearly and without question, the driver for this “second wave of digital transformation” has been COVID-19. Digging a little deeper, we’ve seen first-hand how quickly some organizations pivoted to the new norm of remote working. Fortunately, Trustwave SpiderLabs has been providing remote penetration testing for a number of years so we were well set for this shift and have been able to carry on with keeping our customers secure.
With the recent takedown of the notorious botnet known as Emotet, we thought it would be a good time to pause to reflect on the long history of this malware strain and cybercrime operation. To do that, we asked for a perspective from Phil Hay, Research Manager at Trustwave SpiderLabs, who has spent decades tracking and thwarting the Emotet threat.
With its recent discovery of three new vulnerabilities in SolarWinds products, the Trustwave SpiderLabs team created quite a stir. To get a better understanding of why this finding was so significant, we interviewed Karl Sigler, Threat Intelligence Manager at Trustwave SpiderLabs, to break down what the discoveries were and what organizations should do to protect themselves. Find that video interview in this post.
Sign up to receive the latest security news and trends from Trustwave.