Loading...
Blogs & Stories

Trustwave Blog

The Trustwave Blog empowers information security professionals to achieve new heights through expert insight that addresses hot topics, trends and challenges and defines best practices.

Hazard Reduction: 5 Steps to Adapt Your Cybersecurity Strategy for 2020

As security leaders kick off the New Year with fresh perspectives and goals aimed at measurably reducing cyber risk within their respective organizations, it may be time to revisit data protection strategies. Here, Nick Ellsmore, director of consulting and professional services, APAC, at Trustwave, highlights five key areas to focus on to take an adaptive approach to cybersecurity as our lap around the sun once again begins.

10 Essential Cybersecurity Tips for Businesses

Knowledge is power when it comes to cybersecurity, which is why members of the Global Telco Security Alliance have provided businesses and other organizations with 10 key insights they should know about the state of cybersecurity.

Experts Q&A: A 2019 Review of Cybersecurity and What to Expect

As 2019 is behind and the road to 2020 seems like a far stretch ahead, we once again checked back in with some folks from the elite SpiderLabs team at Trustwave to get their thoughts on what’s taken place, but most importantly, what 2020 could have in store for us.

Spider Tales: The Top 9 SpiderLabs Stories of 2019

After a slew of big events in 2019, we’ve decided to compile a list of the top nine SpiderLabs posts of the year that feature insights on malware, penetration testing tools and techniques and one major vulnerability disclosed.

CrackQ: 5 Questions with the Password Cracker's Creator

The Trustwave SpiderLabs experts are known for the open-source security projects they release throughout the year. We caught up with the creator of the latest tool, dubbed CrackQ, for a breakdown of what it is and what it offers for Red Teams.

What Attackers Aim to Compromise in Cloud Environments

As modern-day organizations continue to increase their workloads in the cloud, attackers are taking aim and shifting their tactics to compromise them. This Q&A features insights on what cybercriminals prefer to target in cloud environments.

3 Multi-Cloud Environment Challenges to Overcome

The list of obstacles security leaders experience to reach an ideal state of cyber resiliency in a multi-cloud environment is long, but important steps and decisions need to be made when it comes to the following three areas.

The Cybersecurity Maturity Model Certification: 5 Important Things to Know and Prepare For

The Department of Defense previously had an honor-system in place for contractors and subcontractors to meet cybersecurity compliance. This is all about the change with the introduction of the Cybersecurity Maturity Model Certification. Here are five important facts that you need to know and prepare for as the requirements are baked into RFIs and RFPs in 2020.

BEC Campaigns: Is Deepfake Tech a Cybercriminals Next Biggest Asset?

As business email compromise attacks continue to rise, impacting organizations across sectors, one can help but think what could be on the horizon as cybercriminals continue to leverage emerging technology. Here, we explore how deepfake technology may be a future asset for threat actors.

Embarking on a Hybrid SOC Journey

A discussion on the capabilities that would make a hybrid SOC partner most successful and key items organizations should focus on if they’re thinking of embarking on a hybrid SOC journey.

Misconfigurations: A Hacker’s Path of Least Resistance

Digital crooks won’t start off their attack campaigns by spending hours on developing custom file payloads or trojans. They’re looking for the path of least resistance, and most of the time, that’s by exploiting a misconfiguration in their target’s network.

Becoming Agile in Today’s Cyber Climate

Security organizations that embrace adaptive security are both agile when it comes to the threat landscape, but also continue to evolve proactively through the threat research and intelligence sharing it consumes. Here are steps you should take to point the security organization in the direction of becoming an agile and proactive function.

How to Minimize the Value of Your Database

Far too much information that either carries too little or too much value is stored in databases, making it difficult to manage at times from an information security standpoint. Trustwave Senior Product Manager Thomas Patterson discusses how security leaders can minimize the value in their databases and provides a good rule of thumb to follow when it comes time to decide what should and shouldn’t be kept in the database.

Stay Connected


Subscribe

Sign up to receive the latest security news and trends from Trustwave.

No spam, unsubscribe at any time.


Blog Categories


Trending Topics