UK Must Prioritize Cybersecurity Governance Amidst Rising Threat of Cybercrime

April 30, 2024 | Barry O’Connell

If the UK is serious about digitizing the economy, then cybersecurity is ...

Behind the Scenes of the Change Healthcare Ransomware Attack Cyber Gang Dispute

April 18, 2024 | Greg Monson

Editor’s Note – The situation with the Change Healthcare cyberattack is ...

Managed Detection and Response Providers Shouldn’t Lay Claim to Your Custom Content

April 04, 2024 | Christian Giuffrida

Among the due diligence a company should perform when signing with a managed ...

Why Offensive Security is a Necessity for a Dynamic Threat Landscape

March 29, 2024

Today's ever-shifting threat landscape demands a multi-pronged approach to ...

Unlocking Cyber Resilience: UK’s NCSC Drafts Code of Practice to Elevate Cybersecurity Governance in UK Businesses

February 28, 2024

In late January, the UK’s National Cyber Security Centre (NCSC) issued the ...

LockBit Takedown: Law Enforcement Disrupts Operations, but Ransomware Threats Likely to Persist

February 21, 2024 | Ed Williams

The news that US, UK, and other international law enforcement agencies ...

Understanding Why Supply Chain Security is Often Unheeded

February 14, 2024 | Craig Searle

Many organizations downplay the critical aspect of whether their cybersecurity ...

Winning the Super Bowl of Security: An Offense-Informed Defensive Strategy

February 08, 2024 | David London, Damian Archer

We always emphasize that cybersecurity is a team sport. As millions sit down to ...

Preparing for the Impact of Artificial Intelligence's Cybersecurity

February 02, 2024 | Ed Williams

The integration of Artificial intelligence (AI) is forcing a significant ...

Federal Water and Wastewater Security Incident Response Guide Falls Short

January 29, 2024 | Kevin Kerr

This week, federal guidelines were published to assist owners and operators in ...

Top 10 Trustwave Blog Posts: Industry Threat Reports, Developing Robust Security Top of Mind for 2023

December 28, 2023

The most popular Trustwave blog posts in 2023 were a roadmap of what concerned ...

Trustwave 2024 Predictions Part 2: Cyber Talent Shortage and the US Federal Government

December 20, 2023

There is every reason to believe that 2024 will be an interesting year in the ...

Trustwave 2024 Cybersecurity Predictions: Artificial Intelligence and the US Presidential Election

December 19, 2023

There is every reason to believe that 2024 may be an interesting year in the ...

Unlock the Power of Your SIEM with Co-Managed SOC

December 08, 2023 | Jason Whyte

Security information and event management (SIEM) systems play a pivotal role in ...

Trustwave’s Observations on the Recent Cyberattack on Aliquippa Water Treatment Plant

December 01, 2023 | Allen Numerick

The attack last week on the Municipal Water Authority in Aliquippa, Penn., that ...

How Trustwave Can Assist Tribal Governments Applying for $18 Million in DHS Cybersecurity Grants

December 01, 2023

Tribal governments are among the most underserved organizations in the US when ...

The Two Sides of ChatGPT: Helping MDR Detect Blind Spots While Bolstering the Phishing Threat

November 27, 2023

ChatGPT is proving to be something of a double-edged sword when it comes to ...

Unlocking the Power of Co-Managed SOC: A Strategic Solution for Maximizing SIEM Effectiveness and Cybersecurity Success

November 13, 2023 | Jason Whyte

Security information and event management (SIEM) systems play a pivotal role in ...

Trustwave Measures the Pros and Cons of President Biden’s Executive Order to Regulate AI Development

November 06, 2023

President Joe Biden, on October 30, signed the first-ever Executive Order ...

Continuing the Conversation on Cybersecurity as a Business Risk

November 02, 2023 | Barry O’Connell

Board members often lack technical expertise and may not fully understand the ...

Understanding the Implications of Data Sovereignty and Why Data Residency may be a Better Choice for Your Business

October 27, 2023

The variety of cloud services that store organizational data continues to ...

ChatGPT Update: How Security Teams and Threat Actors are Using Artificial Intelligence

September 20, 2023

ChatGPT and other Large Learning Modules have been in use for less than a year, ...

A Multinational Effort Takes Down the Qakbot Banking Trojan

September 12, 2023

In late August, the FBI took down and dismantled Quakbot, a banking Trojan that ...

CISO’s Corner: Cybersecurity Best Practices: Securing Employee Smartphones

September 05, 2023

Arguably, the most used device by an organization’s employees is their ...

Managed Vulnerability Scanning Made Easy

August 30, 2023 | Jay Gill

There are few security tasks more important, yet more difficult, to conduct ...

Creating a Physical Security Standard for Your Company

August 23, 2023

Cybersecurity is the pressing concern most organizations face when it comes to ...

Protecting Our Communities: Navigating Cyberattacks Against Municipalities and Bolstering Cybersecurity

August 14, 2023

Municipalities are no strangers to cyberattacks, but the introduction and ready ...

5 Reasons to Pursue a Career in Cybersecurity

August 10, 2023 | Jason Whyte

Cyberattacks have not only become more frequent, sophisticated, and costly, but ...