CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

RSA Conference 2017: Getting in Front of Cyber Threats

RSA Conference 2017 is underway in San Francisco. Now in its 26th year, the annual show remains the industry's most reliable pulse-check on the challenges facing IT and security professionals. While the Black Hat conference is known for its offensive-minded talks on "breaking things" to discover vulnerabilities, RSA remains very much an event designed for discourse on adequately defending one's environment from the menacing hands of adversaries.

This year's show overlapped with Valentine's Day - and there are certainly plenty of broken security hearts pacing the show floor, seeking comfort amid a turbulent attack landscape. From hundreds of track sessions to countless more candid conversations amid the conference halls, RSA presents Trustwave with an invaluable way to connect with the wider community. From the start of the show, our booth has been a bustling destination from which we've featured expert presentations, practical demos and plush giveaways.

Hot topics at this year's show should be unsurprising to anyone engaged in the fight: ransomware, Internet of Things and the importance of accelerating and improving the ability to recognize and thwart compromises amid the huge numbers - and long durations - of breaches impacting organizations worldwide.

All three of those themes play into the work that Trustwave (the newly crowned Best Managed Security Service SC Award winner) performs, especially around threat detection and response - a topic near and dear to Brian Hussey, our global director of incident response and readiness. He joined us on the show floor to discuss some of the eye-opening research and forensic work he and his team have undertaken, as well as the importance of proactively hunting for threats.

Latest Trustwave Blogs

Effective Cybersecurity Incident Response: What to Expect from Your MDR Provider

Companies engage with a managed detection and response (MDR) provider to help ensure they detect cyber threats before they do any damage. The "response" part of the MDR moniker is key to that effort,...

Read More

The Power of Red and Purple Team Drills in Enhancing Offensive Security Programs

Despite investing in costly security solutions, keeping up with patches, and educating employees about suspicious emails, breaches still occur, leaving many organizations to wonder why they are...

Read More

Balancing Innovation and Security: How Offensive Security Can Help Navigate the Tech Industry’s Dual Challenges

Two of the greatest threats facing technology-focused organizations are their often-quick adoption of new technologies, such as artificial intelligence (AI), without taking security measures into...

Read More