Behind the Scenes of the Change Healthcare Ransomware Attack Cyber Gang Dispute

Managed Detection and Response Providers Shouldn’t Lay Claim to Your Custom Content

Among the due diligence a company should perform when signing with a managed detection and response ...

Read More

Why Offensive Security is a Necessity for a Dynamic Threat Landscape

Today's ever-shifting threat landscape demands a multi-pronged approach to cybersecurity. ...

Read More

Unlocking Cyber Resilience: UK’s NCSC Drafts Code of Practice to Elevate Cybersecurity Governance in UK Businesses

In late January, the UK’s National Cyber Security Centre (NCSC) issued the draft of its Code of ...

Read More

LockBit Takedown: Law Enforcement Disrupts Operations, but Ransomware Threats Likely to Persist

The news that US, UK, and other international law enforcement agencies disrupted LockBit is ...

Read More

Understanding Why Supply Chain Security is Often Unheeded

Many organizations downplay the critical aspect of whether their cybersecurity provider has the ...

Read More

Winning the Super Bowl of Security: An Offense-Informed Defensive Strategy

We always emphasize that cybersecurity is a team sport. As millions sit down to watch the Kansas ...

Read More

Preparing for the Impact of Artificial Intelligence's Cybersecurity

The integration of Artificial intelligence (AI) is forcing a significant transformation in the ...

Read More

Federal Water and Wastewater Security Incident Response Guide Falls Short

This week, federal guidelines were published to assist owners and operators in the water and ...

Read More

Top 10 Trustwave Blog Posts: Industry Threat Reports, Developing Robust Security Top of Mind for 2023

The most popular Trustwave blog posts in 2023 were a roadmap of what concerned our readers during ...

Read More

Trustwave 2024 Predictions Part 2: Cyber Talent Shortage and the US Federal Government

There is every reason to believe that 2024 will be an interesting year in the cybersecurity space, ...

Read More

Trustwave 2024 Cybersecurity Predictions: Artificial Intelligence and the US Presidential Election

There is every reason to believe that 2024 may be an interesting year in the cybersecurity space, ...

Read More

Unlock the Power of Your SIEM with Co-Managed SOC

Security information and event management (SIEM) systems play a pivotal role in cybersecurity: they ...

Read More

Trustwave’s Observations on the Recent Cyberattack on Aliquippa Water Treatment Plant

The attack last week on the Municipal Water Authority in Aliquippa, Penn., that gave threat actors ...

Read More

How Trustwave Can Assist Tribal Governments Applying for $18 Million in DHS Cybersecurity Grants

Tribal governments are among the most underserved organizations in the US when it comes to ...

Read More

The Two Sides of ChatGPT: Helping MDR Detect Blind Spots While Bolstering the Phishing Threat

ChatGPT is proving to be something of a double-edged sword when it comes to cybersecurity.

Read More

Unlocking the Power of Co-Managed SOC: A Strategic Solution for Maximizing SIEM Effectiveness and Cybersecurity Success

Security information and event management (SIEM) systems play a pivotal role in cybersecurity: they ...

Read More

Trustwave Measures the Pros and Cons of President Biden’s Executive Order to Regulate AI Development

President Joe Biden, on October 30, signed the first-ever Executive Order designed to regulate and ...

Read More

Continuing the Conversation on Cybersecurity as a Business Risk

Board members often lack technical expertise and may not fully understand the risks associated with ...

Read More

Understanding the Implications of Data Sovereignty and Why Data Residency may be a Better Choice for Your Business

The variety of cloud services that store organizational data continues to proliferate in type and ...

Read More

ChatGPT Update: How Security Teams and Threat Actors are Using Artificial Intelligence

ChatGPT and other Large Learning Modules have been in use for less than a year, yet these ...

Read More

A Multinational Effort Takes Down the Qakbot Banking Trojan

In late August, the FBI took down and dismantled Quakbot, a banking Trojan that primarily spread ...

Read More

CISO’s Corner: Cybersecurity Best Practices: Securing Employee Smartphones

Arguably, the most used device by an organization’s employees is their smartphone. Ensuring that ...

Read More

Managed Vulnerability Scanning Made Easy

There are few security tasks more important, yet more difficult, to conduct than a vulnerability ...

Read More

Creating a Physical Security Standard for Your Company

Cybersecurity is the pressing concern most organizations face when it comes to securing data, but ...

Read More

Protecting Our Communities: Navigating Cyberattacks Against Municipalities and Bolstering Cybersecurity

Municipalities are no strangers to cyberattacks, but the introduction and ready availability of ...

Read More

5 Reasons to Pursue a Career in Cybersecurity

Cyberattacks have not only become more frequent, sophisticated, and costly, but they are not about ...

Read More

The Risks and Rewards of ChatGPT in the Modern Business Environment

ChatGPT continues to lead the news cycle and increase in popularity, with new applications and uses ...

Read More