
Unlock the Power of Your SIEM with Co-Managed SOC
Security information and event management (SIEM) systems play a pivotal role in cybersecurity: they offer a unified solution for gathering and assessing alerts from a plethora of..

Trustwave’s Observations on the Recent Cyberattack on Aliquippa Water Treatment Plant
The attack last week on the Municipal Water Authority in Aliquippa, Penn., that gave threat actors access to a portion of the facility’s pumping equipment has spurred the..

How Trustwave Can Assist Tribal Governments Applying for $18 Million in DHS Cybersecurity Grants
Tribal governments are among the most underserved organizations in the US when it comes to cybersecurity preparation, with threat actors striking multiple tribes with a variety of..

The Two Sides of ChatGPT: Helping MDR Detect Blind Spots While Bolstering the Phishing Threat
ChatGPT is proving to be something of a double-edged sword when it comes to cybersecurity.

Unlocking the Power of Co-Managed SOC: A Strategic Solution for Maximizing SIEM Effectiveness and Cybersecurity Success
Security information and event management (SIEM) systems play a pivotal role in cybersecurity: they offer a unified solution for gathering and assessing alerts from a plethora of..

Trustwave Measures the Pros and Cons of President Biden’s Executive Order to Regulate AI Development
President Joe Biden, on October 30, signed the first-ever Executive Order designed to regulate and formulate the safe, secure, and trustworthy development and use of artificial..

Continuing the Conversation on Cybersecurity as a Business Risk
Board members often lack technical expertise and may not fully understand the risks associated with cybersecurity. On the other hand, CISOs are more familiar with IT staff and the..

Understanding the Implications of Data Sovereignty and Why Data Residency may be a Better Choice for Your Business
The variety of cloud services that store organizational data continues to proliferate in type and number leading to tension as more governments, policymakers, and organizations..

ChatGPT Update: How Security Teams and Threat Actors are Using Artificial Intelligence
ChatGPT and other Large Learning Modules have been in use for less than a year, yet these applications are transforming at an almost exponential rate.

A Multinational Effort Takes Down the Qakbot Banking Trojan
In late August, the FBI took down and dismantled Quakbot, a banking Trojan that primarily spread through spam and phishing emails and has been active and continuously updated..

CISO’s Corner: Cybersecurity Best Practices: Securing Employee Smartphones
Arguably, the most used device by an organization’s employees is their smartphone. Ensuring that anyone, from the CEO to a newcomer being onboarded, knows how to keep this device..

Managed Vulnerability Scanning Made Easy
There are few security tasks more important, yet more difficult, to conduct than a vulnerability scanning program.

Creating a Physical Security Standard for Your Company
Cybersecurity is the pressing concern most organizations face when it comes to securing data, but not every hacker launches an attack from thousands of miles away; sometimes, the..

Protecting Our Communities: Navigating Cyberattacks Against Municipalities and Bolstering Cybersecurity
Municipalities are no strangers to cyberattacks, but the introduction and ready availability of malware through ransomware-as-a-service providers has led to an increasing number..

5 Reasons to Pursue a Career in Cybersecurity
Cyberattacks have not only become more frequent, sophisticated, and costly, but they are not about to stop. This means unprepared organizations right now are scrambling to protect..

The Risks and Rewards of ChatGPT in the Modern Business Environment
ChatGPT continues to lead the news cycle and increase in popularity, with new applications and uses seemingly uncovered each day for this innovative platform.

CISO Connect: Insights on Strategic Partnerships and Threat Readiness
The role of the CISO is expanding alongside the growing adoption of digital technologies, which has resulted in a faster and more interconnected workforce. The dynamic and..

How the Intersection of Technology and Patient Care Creates Security Challenges
The digital transformation of healthcare, involving patients, staff, doctors, and technology, presents significant challenges to security teams in terms of skills and capacity.