Trustwave Blog
The Trustwave Blog empowers information security professionals to achieve new heights through expert insight that addresses hot topics, trends and challenges and defines best practices.

The Beauty of a Red Team Exercise: When One Discovery Leads to Potentially Saving Lives
What started out as a standard Red Team test designed to check the security capabilities of several Australian hospitals, led to a chain of events that eventually uncovered..

A Comprehensive Guide to Securing Data in the Digital Age
In today's rapidly evolving digital landscape, data stands as the linchpin of modern business operations.

ChatGPT Update: How Security Teams and Threat Actors are Using Artificial Intelligence
ChatGPT and other Large Learning Modules have been in use for less than a year, yet these applications are transforming at an almost exponential rate.

Insider Threats: Ensuring Angry Employees and Innocent Do-Gooders Don’t Derail Your Organization
Threats that arrive from outside an organization are difficult to deal with, but at least business leaders understand that they exist and prepare a proper defense. However, many..

MSSP Alert Names Trustwave to 2023 Top 250 MSSPs List
For the seventh consecutive year, Trustwave has been named a Top 10 Managed Security Services Provider by MSSP Alert.

Cybercrime Never Takes a Vacation. Cybersecurity in the Hospitality Industry
The Trustwave SpiderLabs team conducted a multi-month investigation into the cyber threats facing the hospitality industry worldwide and has released a detailed report displaying..

Australian Business Awards 2023 Honors Trustwave as Employer of Choice
Trustwave today announced it won the Australian Business Awards (ABA) Employer of Choice (EOC) Awards 2023 award recognizing Trustwave as one of the top businesses to work for in..

Infographic: What You Need to Know About Cyber Threats Targeting Hospitality
The Trustwave SpiderLabs team has completed an extensive investigation into the global cyber threats targeting the hospitality sector and a companion infographic that concisely..

A Multinational Effort Takes Down the Qakbot Banking Trojan
In late August, the FBI took down and dismantled Quakbot, a banking Trojan that primarily spread through spam and phishing emails and has been active and continuously updated..

Trustwave SpiderLabs Research: Cybersecurity in the Hospitality Industry
The Trustwave SpiderLabs team conducted a multi-month investigation into the cyber threats facing the hospitality industry worldwide and has released a detailed report displaying..

Trustwave Honored by Brandon Hall Group for Best Advance in Corporate Culture Transformation
The human resources firm Brandon Hall Group honored Trustwave for "Best Advance in Corporate Culture Transformation" in its coveted 2023 HCM Excellence Awards™.

CISO’s Corner: Cybersecurity Best Practices: Securing Employee Smartphones
Arguably, the most used device by an organization’s employees is their smartphone. Ensuring that anyone, from the CEO to a newcomer being onboarded, knows how to keep this device..

CISA Unveils Upcoming Cybersecurity Strategic Plan
The Cybersecurity & Infrastructure Security Agency (CISA) has released its 2024-2026 Cybersecurity Strategic Plan, which the agency says will change the trajectory of our national..

Managed Vulnerability Scanning Made Easy
There are few security tasks more important, yet more difficult, to conduct than a vulnerability scanning program.

How Trustwave Uses Enterprise Penetration Testing to Fortify a Client's Defensive Posture
Anyone who has played a Tower Defense-style game, (Plants Vs. Zombies being a favourite) knows the only way to hold off the hoard of brain-eating zombies is to know your..

Creating a Physical Security Standard for Your Company
Cybersecurity is the pressing concern most organizations face when it comes to securing data, but not every hacker launches an attack from thousands of miles away; sometimes, the..

Maximising Your Microsoft Security Environment
If you're a Microsoft-focused organization you may be able to leverage the technology you already have to become more secure.

9 Steps to Protect Against the Next MOVEit/MFT Attack
By now, the facts of the recent MOVEit breach are well known (although the victim total keeps climbing), but it never hurts to be reminded that these attacks do not take place in..