Trustwave MailMarshal's Secure Email Gateway Protects Against Phishing/Ransomware Attacks

March 25, 2025

Combat Medusa Ransomware: Learn how Trustwave MailMarshal's secure email ...

How Managed Database Security Enhances Compliance, Privacy, and Threat Defense for the Financial Services Sector

March 12, 2025

Proactive Threat Defense for Financial Institutions: Trustwave's DbProtect ...

The Threat Within: Understanding the Role of Malicious Insiders in Cyberattacks

February 13, 2025

Understanding Insider Threats: Learn how insider threats in the financial ...

Will the UK's Ransomware Proposal Work? Trustwave Weighs in on the Potential Impact

February 06, 2025

The recent UK Home Office proposal designed to hinder and disrupt ransomware ...

Trustwave SpiderLabs: Examining How New Ransomware Groups Emerge

February 04, 2025

Two newcomers have made their way onto the ransomware threat group stage, ...

Analyzing Salt Typhoon: Telecom Attacker

December 12, 2024

Unveiling Salt Typhoon: A New Wave in Cyber Espionage Discover how this ...

Why a Zero Trust Architecture Must Include Database Security

November 27, 2024

Whether the means of a cyber-attack are phishing, ransomware, advanced ...

10 Tips to Help Holiday Shoppers to Stay Safe from Scams and Cyberattacks

November 20, 2024

The holiday season is here, and with it comes the thrill of Black Friday deals ...

Top Database Security Tools for Enhanced Vulnerability Assessment and Compliance

November 14, 2024

Let’s take a look at how traditional vulnerability assessment (VA) tools ...

Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers

November 07, 2024

This blog is the latest in a series that delves into the deep research ...

$500,000 HHS Fine Underscores the Need for Security and Compliance in Healthcare

November 01, 2024

With the rise in cyberattacks and ransomware incidents, healthcare ...

How Phishing-as-a-Service Exposes Financial Services to Extensive Threats

September 12, 2024

Phishing remains the favored and most successful method of obtaining an initial ...

Phishing and Ransomware: How Threat Actors Attack the Financial Services Sector

September 04, 2024

Trustwave SpiderLabs is prepped to launch its newest threat intelligence ...

6 Steps on How to Respond to a Data Breach Before it Ruins Your Business

July 17, 2024

Too many consumers have awoken one morning to find messages from a retailer or ...

Latest AT&T Data Breach Highlights the Need to Double Down on Cybersecurity Basics

July 15, 2024 | Eric Harmon

AT&T reported on July 12 that an internal investigation had revealed that ...

Uncovering the Dirty Secret of Open-Source Code and Its Risks for Organizations

May 08, 2024 | Craig Searle

Using open-source code exposes organizations to a tremendous amount of risk, ...

Balancing Innovation and Security: How Offensive Security Can Help Navigate the Tech Industry’s Dual Challenges

April 11, 2024

Two of the greatest threats facing technology-focused organizations are their ...

Unraveling the True Cost of Ransomware Attacks and Essential Strategies for Mitigation

March 06, 2024 | Barry O’Connell

A ransomware attack can demoralize or debilitate organizations quite like no ...

Defending Healthcare Databases: Strategies to Safeguard Critical Information

February 23, 2024

The healthcare sector continues to be a primary target for threat actors, with ...

One Year Later: What We Have Learned from the Colonial Pipeline Attack

May 06, 2022

As we approach the one-year anniversary of the Colonial Pipeline ransomware ...

Seven Months After the SolarWinds Attack: What Has Changed and What Still Needs To

July 22, 2021 | Bill Rucker

You likely know the story. In December of 2020, perhaps the most devastating ...