Using a Systematic Approach to Creating an Offensive Security Program

May 03, 2024

An offensive security strategy is a sophisticated and dynamic approach that ...

7-Step Guide to Properly Scoping an Offensive Security Program

April 26, 2024

Offensive security has become a cornerstone strategy for organizations aiming ...

Unlocking the Power of Offensive Security: Trustwave's Proactive Approach to Cyber Defense

April 19, 2024

Clients often conflate Offensive Security with penetration testing, yet they ...

Effective Cybersecurity Incident Response: What to Expect from Your MDR Provider

April 15, 2024

Companies engage with a managed detection and response (MDR) provider to help ...

The Power of Red and Purple Team Drills in Enhancing Offensive Security Programs

April 12, 2024

Despite investing in costly security solutions, keeping up with patches, and ...

Understand Your Threat Landscape with Trustwave's Threat Intelligence as a Service Solution

April 02, 2024

Trustwave today added Threat Intelligence as a Service (TIaaS) to its offensive ...

How to Ensure Proper Managed Detection and Response Coverage, Even with Rapid Onboarding

March 18, 2024 | Christian Giuffrida

Managed detection and response (MDR) providers often tout how quickly they can ...

Navigating Security Risks and Innovations in the Hospitality Industry

March 13, 2024 | Kory Daniels

As technology has become available, the hospitality industry has focused on ...

Unraveling the True Cost of Ransomware Attacks and Essential Strategies for Mitigation

March 06, 2024 | Barry O’Connell

A ransomware attack can demoralize or debilitate organizations quite like no ...

Managed Detection and Response: A Cure for Cyber Alert Fatigue and Scalability Challenges

March 04, 2024

Alert fatigue is a long-standing problem in cybersecurity that only increases ...

Defending Healthcare Databases: Strategies to Safeguard Critical Information

February 23, 2024

The healthcare sector continues to be a primary target for threat actors, with ...

Lessons to be Learned: Attacks on Higher Education Proliferate

February 15, 2024

Trustwave SpiderLabs is wrapping up a multi-month investigation into the ...

10 Key Steps to Enhance Mobile Application Security in 2024

February 09, 2024 | Therese Mendoza

In today's digital landscape, ensuring robust security for your mobile ...

Trustwave’s Best Practices for Protecting Against Mother of all Data Breaches

January 24, 2024

The discovery of what has been dubbed the Mother of all Data Breaches (MOAB), ...

Let’s Get Physical with Security Requirements

January 23, 2024 | Jason Whyte

Not every criminal illegally entering a business is looking to steal cash, ...

How a Managed Detection and Response Service Helps Get the Most out of Microsoft Defender XDR

January 12, 2024

For years, Microsoft has been making significant inroads in the security space, ...

Tabletop Exercises: The Key to Recovering From a Devastating Cyberattack

December 14, 2023 | Don White

The exploitation of the CitrixBleed vulnerability in Netscale by a variety of ...

Defending Against ChatGPT-Enhanced Phishing with Managed Detection and Response

December 13, 2023

Phishing, already a serious, ever-present threat, is getting even more ...

Managing Risk Appetite: Balancing Cybersecurity and Business Growth

November 07, 2023 | Ed Williams

Determining, dealing with, and accepting a certain level of risk will always be ...

Final Cybersecurity Awareness Month Thoughts: Don't Get Hooked By a Phishing Email

October 31, 2023

We close out Cybersecurity Awareness Month for 2023 with a few final points ...

How a Database Risk Assessment Reduces the Risk of a Cyberattack

October 13, 2023

Database security often, and to an organization's detriment, falls between the ...

Strong Passwords and MFA: Two Easy Fixes to Enhance Your Cybersecurity Posture

October 12, 2023

As 2023 Cybersecurity Awareness Month continues, let's look at a couple of the ...

Focus on these 3 Areas to Develop a Strong Cybersecurity Posture With Fewer Resources

October 05, 2023 | Jason Whyte

Not every organization's security apparatus is built or funded at the same ...

10 Dynamic Principles for Crafting a Robust Database Security Strategy

October 04, 2023

The digital world relies on data, which because of its considerable value, is ...

The Beauty of a Red Team Exercise: When One Discovery Leads to Potentially Saving Lives

September 27, 2023

What started out as a standard Red Team test designed to check the security ...

How Trustwave Uses Enterprise Penetration Testing to Fortify a Client's Defensive Posture

August 25, 2023

Anyone who has played a Tower Defense-style game, (Plants Vs. Zombies being a ...

Maximising Your Microsoft Security Environment

August 21, 2023 | Grant Hutchons

If you're a Microsoft-focused organization you may be able to leverage the ...

9 Steps to Protect Against the Next MOVEit/MFT Attack

August 17, 2023

By now, the facts of the recent MOVEit breach are well known (although the ...