A Cautionary Tale of a Data Breach

If you're reading this blog, there's a good chance you're familiar with the topic of data breaches; ...

Read More

Now is the time to Partner With Trustwave MDR

Trustwave Managed Detection and Response (MDR) is one of the most important cybersecurity offerings ...

Read More

CISO's Corner: Cyber Defense Lessons for OT and Supply Chain Infrastructure

2022 has been busy in the cyber world. While there were signals in 2021 with the increased in ...

Read More

Best Practices for Securing Wireless Networks

Most organizations employ mobile computing, which utilizes wireless communications for staff ...

Read More

MailMarshal: Protecting Against Email-based Threats Has Become Survival of the Fittest

Email security is not a simple check-box item. The need to have a strong email security solution in ...

Read More

Good Enough is not Enough When It Comes to Database Security

The threats facing databases today are numerous and constantly evolving as the perimeter continues ...

Read More

CISO's Corner: 5 Questions to Ask Before Implementing an XDR Program

Let's dive head-first into this new security acronym, XDR, or extended detection and response. ...

Read More

Trustwave Security Colony Vendor Assessment: Know Your Vulnerabilities Before Others Do

This is the second installment in Trustwave’s in-depth tour of our Security Colony platform. For a ...

Read More

Enhancing Your Operational Technology Resiliency

Maintaining cyber resilience across your ecosystem is a significant challenge that must not be ...

Read More

Purple Team Exercises: Preparing a Cybersecurity Team for a Red Team Attack

This is the second in a series of blogs that describes the importance and inner workings of ...

Read More

5 Ways CISOs Can Leverage the Power of Trustwave Security Colony

Home improvement stores like Home Depot and Lowes are the lifeline for a lot of contractors looking ...

Read More

Creating Buy-In for a Cybersecurity Awareness Program

There is more to implementing a successful cybersecurity training program than to task IT with the ...

Read More

Red, Purple, and Blue: The Colors of a Successful Cybersecurity Testing Program

This is the first in a series of blogs that will describe the importance of conducting Red and ...

Read More

Webinar - The Age of MSSPs: Uncovering the Why’s of Managed Services

With security risks continuously mounting and the threat landscape evolving at record speed, ...

Read More

Data Assessment in Healthcare: Knowing What Data You Have Is Half the Battle

When it comes to protecting personal healthcare information or a medical facility from cyberattacks ...

Read More

How Data Privacy Has Evolved in the Age of the Breach

As Data Privacy Day once again rolls around, we can look back at some healthy improvements when it ...

Read More

The Year in Review: Looking Back at the Top Trustwave Blog Posts

The most popular Trustwave blog posts in 2021 were indicative of the year itself in cyber. There ...

Read More

The Cybersecurity Playbook You Need to Run To Mitigate Risk During M&A

Mergers and acquisitions are high-risk endeavors, sometimes with billions of dollars and corporate ...

Read More

MDR Is No Longer ‘Nice to Have’ for Cyber Resilience, It’s Mandatory

In today’s evolving threat landscape, the decision of whether to bring in external expertise to ...

Read More

Cybersecurity in the Year Ahead: Trustwave 2022 Cybersecurity Predictions – Part 2

This is part 2 of Trustwave’s 2022 Cybersecurity Predictions blog series.

Read More

The Great Cybersecurity Talent Migration has Begun, Here’s What you Can Do

The macro-economic consequences of COVID-19 have reached cybersecurity and the talented people who ...

Read More

Crisis Simulation: The 4 Most Common Cybersecurity Incident Shortfalls

For an organization to be resilient, key personnel must be acutely aware of their roles and ...

Read More

Hybrid and Remote Work is Here to Stay: What Does This Mean for Cybersecurity?

Gone are the days when remote work was the exception and the most distributed employee was the ...

Read More

Proposed Bill Would Require Ransomware Victims to Disclose Ransom Amount

Sen. Elizabeth Warren, D-Mass., and Rep. Deborah Ross, D-N.C., introduced a bill last week that ...

Read More

What You Need To Know About the New Essential 8 Mitigation Strategies

In July 2021, the Australian Cyber Security Centre (ACSC) released an update to its Essential 8 ...

Read More

The 3 Biggest Pieces of the Healthcare Data Security Puzzle

Healthcare is unlike any other industry when it comes to cybersecurity. Criminals are prepared to ...

Read More

How Banks Need to Evolve Security in the Age of the Cloud

As a high-profile target for breach attempts, banks are all too familiar with having a bullseye on ...

Read More

Why Partnership Between the CISO and Internal Audit Is Critical To Achieving Cyber Resilience

Most security leaders look at Internal Audit as performing assessments or investigations and ...

Read More