Trustwave Senior Product Manager Thomas Patterson breaks down what it means for security leaders to protect "the last mile," in addition to highlighting some of the major security threats aimed at databases today.
Trustwave SpiderLabs Senior Security Research Manager Karl Sigler discusses the problems that encrypted malicious activity poses, but offers up solutions that security leaders can use to overcome them.
Time is money for auditors, but when their tasks involve too much manual work, inefficiency rears its ugly head, causing major gaps in performing tasks effectively. Here's a breakdown of the three most inefficient tasks tied to database audits.
Not every organization needs an in-house security operations center. But if yours is prepared to build one out, here are some thoughts and considerations to keep top of mind before you get started.
With the release of the Trustwave Fusion platform, the traditional dichotomy of customer and security partners is erased, giving security leaders the ability to take action on protecting assets and exterminating threats as they occur.
To reach the ideal security culture within your business, there are three primary areas you should focus on to get the most bang for their buck out of their security awareness programs.
Conventional problem-solving has no place in information security, especially when it comes to tackling issues tied to the talent gap. In this featured interview, Trustwave's SVP of Managed Security Services, Chris Schueler, discusses how focusing on training your current team can help overcome the talent gap obstacles nearly every enterprise faces.
With Texas facing an onslaught of ransomware threats, we caught up with one of our top ransomware experts to get his take on the evolving malware, what security leaders are failing to do, and steps they should be taking to thwart these attacks.
Dubbed AttackSurfaceMapper, this OSINT tool speeds up and simplifies the reconnaissance process for pen testers, allowing them to focus on the exploitation process.
How are organizations handling security for their multiple clouds and applications? This recent panel discussion featuring cloud industry experts answers that question.
There's a lot to consider when it's time to make a cybersecurity purchasing decision, but before diving into your next Request for Proposal, keep these two important items in mind.
Time flies, especially in the world of cybersecurity. In the blink of an eye, we're midway through the year, so we've decided to connect with our SpiderLabs experts on the 2019 predictions they provided us back in December. Let's see if those have transpired and what they believe is in store for the remainder of the year.
With the challenges security leaders face growing, it's getting more and more difficult to reduce cyber risk without help. As you look to partner with a trust security advisor that can provide supplemental assistance, here are seven important questions to ask before you begin the relationship.
The modern-day business moves at the speed of light to cater to the digital customer of today. The innovation tied to this evolution can present some serious challenges for security professionals from a technical standpoint, but none that can't be overcome by the insight shared in this video interview.
The term "reactive" no longer has a place in cybersecurity strategy. For security leaders determined to protect their organization's critical assets, the only way to do so is to build anticipation into their mindset and overall approach to reducing cyber risk.
We've all assessed risk at one point or another in our lives. But when it comes to understanding how much cyber risk your organization can tolerate, an inaccurate assessment could be very costly.
Given the evolving threat landscape, the security leader of today is beginning to understand that they can't overcome the following three enterprise challenges alone. But something can be done about it.
Infographic depicting the top three cybersecurity challenges enterprises face and where a trusted security partner can have significant impact.
The longer that adversaries stay inside corporate networks, the more damage they can cause. One way to significantly reduce this “dwell time” is by enlisting a practice known as proactive threat hunting, and there are plenty of times to justify getting started.
Almost every attack vector leads to the database, which is why you need to devote custom care to these sensitive repositories.
Sign up to receive the latest security news and trends from Trustwave.