Blogs & Stories

Trustwave Blog

The Trustwave Blog empowers information security professionals to achieve new heights through expert insight that addresses hot topics, trends and challenges and defines best practices.

FTSE100: Cyber and The Board – Where Are We Now?

Is cybersecurity actively being discussed at a board level? Can we identify and understand any trends – for example, are specific industries really good at acknowledging all things cyber while others aren’t? To find out, we analyzed every annual report of each Financial Times Stock Exchange 100 (FTSE100) company.

CISO Data Headaches – CISO Data Solutions

As somebody who regularly speaks to CISOs across different industries, sectors and levels of cyber maturity, Ed Williams, Director of Trustwave SpiderLabs EMEA, has seen first-hand where the headaches exist and what causes these headaches. While all organizations are different and have different risks, finding solutions for those headaches is possible. Here’s what he recommends.

Better Together: How a Secure Email Gateway Can Help Improve Office 365 Security

Office 365 offers unparalleled productivity features that most employees simply can’t do without. But that widespread adoption also makes the platform a big target for malicious actors, who continue to find clever ways to attack organizations. While Office 365 has good built-in security features, is there a way to add even more protection? According to Phil Hay, senior research manager at Trustwave, the answer is yes.

Into the Breach: How 2020 Became A Tipping Point for Cybersecurity

In the year 2020, cybersecurity was thrust into the spotlight in an unprecedented way thanks to what’s being called the FireEye Data Breach & SolarWinds Orion Compromise. In this perspective, we argue that the incident represents a tipping point not only for cybersecurity, but possibly for the world, as threats to information security and data will have an ever-increasing effect on the course of human affairs.

New Year, Same CMMC: What Your Organization Needs to Know Now

With the start of a new year, organizations hoping to do business with the U.S. Department of Defense (DoD) need to be more aware than ever of Cybersecurity Maturity Model Certification (CMMC) requirements. This interview below with Darren Van Booven, Lead Principal Consultant at Trustwave, CMMC Registered Practitioner, and former CISO of the U.S. House of Representatives, can help.

Our Top Blogs of 2020

2020 was a year like no other – and that was reflected in the writing on the Trustwave and Trustwave SpiderLabs blogs, which covered some of the most significant and far-reaching discoveries our teams have ever made, including a massive malware operation that targeted organizations doing business in China. Check out our top blog posts of the year.

2020 and Cybersecurity - A Perspective

Looking back on the year in cybersecurity, Ziv Mador, VP of Security Research at Trustwave SpiderLabs, offers his key insights – and analysis of trends that organizations should prepare for in 2021. #cybersecurity #infosec

3 Ways to Turn Data Risk Mitigation into A Business Growth Opportunity

Organizations already know how important data security is from a defensive, risk mitigation point of view. But there are also sometimes-overlooked ways to turn this defensive strategy into a proactive business growth opportunity. Your data protection programs can play a role in your organization’s growth efforts. Find out how…

SpiderLabs – The Year in Review

Looking back at what has been an unprecedented year in so many ways, cybersecurity leader Mark Whitehead offers his key takeaways and observations – along with recommendations on how organizations should prepare their security programs for the year ahead.

Discussing the Go SMS Pro Discovery

What if the messenger app that you were using was not only exposing your data to almost anyone on the Internet who wanted to find it – but was also making that data available to cybercriminals who have a vested motivation to exploit and sell it? That’s exactly the nightmare scenario that Richard Tan, a Senior Security Consultant with Trustwave SpiderLabs, discovered…

Why You Need To Be Thinking About SD-WAN Security

If your organization hasn’t heard of a software-defined wide area network (SD-WAN) yet, it will soon. SD-WAN is an exciting, relatively new mainstream technology designed to help organizations manage WAN traffic to reduce costs, improve performance, and become more agile. This article examines the potential new risks and vulnerabilities – and offers guidance on managing them.

25 Years of Threats: How Cybersecurity Has Evolved Since 1995

To celebrate the 25th anniversary of Trustwave, we wanted to look back at how our profession has changed – specifically in regard to the evolution of threats, attacks and scams. As the leader of the renowned Trustwave SpiderLabs global security research team, Ziv Mador was the perfect person to interview for this topic.

Discussing US Election Security with Ziv Mador

The Trustwave SpiderLabs teams recently announced the discovery of massive databases containing information on almost all United States voters and consumers for sale on cybercriminal forums. To learn more, we interviewed Ziv Mador, Vice President of Security Research for Trustwave SpiderLabs.

Trustwave Celebrates 25 Years of Cybersecurity Leadership

November 2020 marks a special month for Trustwave as we celebrate our 25th anniversary. Read more about our journey from our founding in 1995 as a small PCI consultancy to our transformation into a global cybersecurity giant and recognized leader in managed security services.

What is the Impact of the Cybersecurity Skills Shortage?

In this new white paper, How To Minimize the Impact of the Cybersecurity Skills Shortage, the skills gap is examined along with solutions that can help maximize the impact that existing cybersecurity teams make, including advanced technologies like managed threat detection and response (MTDR).

Announcing the 2020 Trustwave Data Security Index

The 2020 Trustwave Data Security Index was created to help cybersecurity decision makers and professionals better understand the pressures that are affecting how organizational data is stored and protected. The report was based on a survey of almost 1,000 IT professional and cybersecurity decision makers from around the world, with a focus on the regions of the United States, the United Kingdom, Australia and Singapore.

What Are the Risks of Hosting Data in the Cloud?

For all kinds of organizations, the shift toward the cloud is accelerating. In fact, Gartner predicts that by 2022, 75% of all databases will be deployed or migrated to a cloud platform, with only 5% ever considered for repatriation to on-premises. Of course, along with this great migration come even greater risks – and the obligation to defend against them. To understand a little more about both topics, we talked with Mark Trinidad, a senior product manager at Trustwave.

Redefining Baselining and Tuning for Modern Threat Detection and Response

Historically, baselining and tuning was used by cybersecurity practitioners to configure tools and the actions of managed security service providers (MSSPs) to help organizations generate the appropriate alerts and actions. How can baselining and tuning evolve to fit the current MDR model? To find out, we talked with Kory Daniels, Global Director, Threat Detection & Response Consulting at Trustwave.

Stay Connected


Sign up to receive the latest security news and trends from Trustwave.

No spam, unsubscribe at any time.

Blog Categories

Trending Topics