Blogs & Stories

Trustwave Blog

The Trustwave Blog empowers information security professionals to achieve new heights through expert insight that addresses hot topics, trends and challenges and defines best practices.

Good Enough is not Enough When It Comes to Database Security

The threats facing databases today are numerous and constantly evolving as the perimeter continues to fall away in favor of multi-cloud environments. This change means organizations must adopt an in-depth, data-centric security approach that includes a program designed from the ground up to protect databases.

One Year Later: What We Have Learned from the Colonial Pipeline Attack

As we approach the one-year anniversary of the Colonial Pipeline ransomware attack, it is an excellent time to reflect upon what took place and how that incident can serve as a teaching point for any organization interested in preventing a ransomware attack.

What is a Cyber Crisis Simulation?

There are a variety of methods that an organization can implement to test its ability to withstand a cyberattack or another type of catastrophic situation. One such technique is to conduct a crisis simulation.

Trustwave Recognized in Gartner’s 2022 Market Guide for Managed Security Services

Gartner has recognized Trustwave as a Representative Vendor in the analyst firm’s March 2022 Market Guide for Managed Security Services (MSS). In addition, Gartner previously recognized Trustwave as a leader in its MSS solution in its 2019 Gartner “Magic Quadrant for Managed Security Services, Worldwide.”

Why Managed Detection and Response is a Key Component to any Security Plan

The overnight move to remote and hybrid work models instantly created a more complex infrastructure for many organizations as they shifted their workers from corporate offices to their homes. The threat surface expanded exponentially as devices moved off-prem and into potentially unsecured environments and grew again as workers added their own devices to the mix.

Why MDR is Your Most Important Security Investment

The cybersecurity threat landscape is continuously evolving, with the frequency and impacts of threats like malware and ransomware increasing every year. Today, organizations of all sizes and in every industry sector must be proactively searching for emerging threats and actively monitoring risk to protect themselves – and respond quickly in the event that a threat is identified. Amid this challenging threat landscape, organizations are struggling to find enough cybersecurity professionals to staff their teams. Globally, there is a cybersecurity worker shortage of nearly 2.7 million. So how can companies undertake proactive threat detection and response during a vast skills shortage?

5 Ways CISOs Can Leverage the Power of Trustwave Security Colony

Security Colony is a powerful self-service resource for CISOs. For example, a CISO who is looking to improve their organization's incident response capability can log in and find an updated ransomware playbook the organization can use, customize if needed, and implement. Is your organization concerned about mitigating insider risk? If so, Security Colony has simulation exercise frameworks available for download.

Empowering Women in Cybersecurity

Every woman in cybersecurity should be empowered. Cybersecurity innovation thrives on diversity of thought and background. And the cyber community needs more of both. We recognize every woman who continues to pave the way for change.

Stay Connected


Sign up to receive the latest security news and trends from Trustwave.

No spam, unsubscribe at any time.

Blog Categories

Trending Topics