Vegas or Bust: Trustwave is Heading to Black Hat

July 29, 2014 | Dan Kaplan

The Trustwave gang is heading out to Sin City next week for the 17th annual ...

What You Can Buy for the Same Cost as Malware

July 23, 2014 | Abby Ross

Malware is easier to use and more affordable than ever, making the barrier to ...

5 Reasons to Go Beyond HIPAA Compliance

July 11, 2014 | Dan Kaplan

With the next 12 months promising to bring "especially aggressive punishment" ...

A Simple Strategy to Make Life Harder for Hackers

July 08, 2014 | John Randall

In 2004, Bill Gates predicted that the death of the password was imminent. Yet, ...

Trustwave NAC Receives International Seal of Approval

July 01, 2014 | Abby Ross

In today's internet-connected environment, many employees never truly unplug, ...

3 Warning Signs You May Be Drowning in Apps and Placing Security at Risk

June 27, 2014 | Dan Kaplan

Web, mobile and cloud applications are insanely popular - both from an end-user ...

Why the Heartbleed Bug Won't Go Away

June 25, 2014 | Dan Kaplan

Remember the Heartbleed bug? We told you in April about this dangerous ...

Automated E-Commerce Website Scanning for Compliance and Compromise? Let's Patent That

June 23, 2014 | Abby Ross

Although it may seem like you can buy anything online, that's not always the ...

Despite All of the Breaches, Why Aren't Passwords Getting Any Stronger?

June 20, 2014 | Dan Kaplan

Security companies like ours offer an assortment of technologies and services ...

3 Application Lifecycle Phases You Must Security Test

June 17, 2014 | Grant Swanson

Data breaches are no joke. Incidents involving the loss or exposure of ...

Need Someone to Root Against During the World Cup? Try Malware Pushers

June 12, 2014 | Abby Ross

World Cup 2014 kicks off Thursday and, like most major sports events, employees ...

Why 'Comprehensive' Application Security Is More Important Than Ever

June 10, 2014 | Chris Harget

Ask an IT person why they scan certain applications for vulnerabilities, and ...

Video: Databases Need Their Own Protection

June 02, 2014 | Abby Ross

While network and application security are key components to thwarting a ...

The Making of the 2014 Trustwave Global Security Report

May 29, 2014 | Dan Kaplan

Last week we unveiled one of our biggest projects of the year: the 2014 ...

The 2014 Trustwave Global Security Report Is Here

May 21, 2014 | Dan Kaplan

Today we released our annual 2014 Trustwave Global Security Report, a landmark ...

The State of Application Security in One Digestible View

May 19, 2014 | Dan Kaplan

Applications serve a vital need for organizations. Whether delivered via the ...

How Law Firms Can Help Ensure Data Security Amid Growing Client Concerns

May 06, 2014 | Dan Kaplan

When one thinks of enticing and lucrative hacker targets, law firms likely ...

How to Protect Your Valuable Data When Zero-Day Exploits Are On the Loose

May 03, 2014 | Karl Sigler

During the past two weeks, several zero-day vulnerabilities have turned up in ...

Come Escape the Pressure with Trustwave at Infosecurity Europe

April 28, 2014 | Dan Kaplan

Trustwave is coming to you live this week from Infosecurity Europe in London - ...

4 Ways to Ensure the Next Application You Roll Out is Security Ready

April 17, 2014 | Dan Kaplan

One of the most fascinating and widely covered findings from our recently ...

Why We're Extra Excited This Year About Our SC Magazine Awards Europe Nominations

April 16, 2014 | Abby Ross

The SC Magazine Awards 2014 Europe ceremony is around the corner, and Trustwave ...

FAQs: The Heartbleed Bug

April 10, 2014 | John Miller

We have a big one on our hands. Potentially affecting hundreds of thousands of ...

We're Raising the Curtain at TRANSACT 14

April 02, 2014 | Dan Kaplan

The trillion-dollar payments industry is red hot. This is the true not only ...

March Madness? More like March Malware-ness

March 20, 2014 | Abby Ross

We know March Madness is here because our phones are ringing with security ...

Has Cyber Security Awareness Improved Among the Largest U.K. Businesses?

March 19, 2014 | Tom Neaves

In November 2011, the U.K. government launched its Cyber Security Strategy in ...

6 Common Questions Answered About Windows XP End-of-Life

March 08, 2014 | Dan Kaplan

As we've previously discussed on this blog, Microsoft is ending support on ...

How to Design a Defense Against Point-of-Sale Malware Attacks

March 07, 2014 | Dan Kaplan

Despite increasingly tighter data protection standards, more advanced security ...

How to Prepare for the Incoming Wave of HIPAA Audits

March 04, 2014 | Christoffer Brown

I joined some colleagues from Trustwave last week in Orlando, Fla. for HIMSS14, ...