Database Protection

Enhancing Cybersecurity in Higher Education: Trustwave and Curtin University’s Collaborative Journey

Enhancing Cybersecurity in Higher Education: Trustwave and Curtin University’s Collaborative Journey 2024-12-09 at 16:04 By The digital age has ushered in unprecedented opportunities for education, but it has also exposed institutions to an increasingly complex cyber threat landscape. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Enhancing Cybersecurity in Higher Education: Trustwave and Curtin University’s Collaborative Journey Read More »

Trustwave Launches Two New Microsoft Security Accelerators

Trustwave Launches Two New Microsoft Security Accelerators 2024-12-03 at 16:01 By Trustwave has launched two additional Microsoft Security accelerators designed to quickly increase an organization’s security maturity and identify potential cost-saving initiatives. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Trustwave Launches Two New Microsoft Security Accelerators Read More »

Why a Zero Trust Architecture Must Include Database Security

Why a Zero Trust Architecture Must Include Database Security 2024-11-27 at 16:03 By Whether the means of a cyber-attack are phishing, ransomware, advanced persistent threat, malware, or some combination, the target is ultimately the same: your data. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Why a Zero Trust Architecture Must Include Database Security Read More »

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS) 2024-11-26 at 18:33 By Diana Solomon and John Kevin Adriano Trustwave SpiderLabs has been actively monitoring the rise of Phishing-as-a-Service (PaaS) platforms, which are increasingly popular among threat actors. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS) Read More »

How Prices are Set on the Dark Web: Exploring the Economics of Cybercrime

How Prices are Set on the Dark Web: Exploring the Economics of Cybercrime 2024-11-25 at 16:03 By Finding the exact price of any product is now easier than ever. A quick check with your favorite online retailer will show that a GE Profile Dryer goes for $989, a 10-pack of Play-Doh can be had for

React to this headline:

Loading spinner

How Prices are Set on the Dark Web: Exploring the Economics of Cybercrime Read More »

Black Friday Cybersecurity Checklist: Safeguard Your Store and Customer Data

Black Friday Cybersecurity Checklist: Safeguard Your Store and Customer Data 2024-11-21 at 16:03 By The holiday season starts on Black Friday and is the busiest time of year for retailers, but it’s also a peak period for cybercriminals who look to exploit vulnerabilities in business of all sizes. This article is an excerpt from Trustwave

React to this headline:

Loading spinner

Black Friday Cybersecurity Checklist: Safeguard Your Store and Customer Data Read More »

Managed Vulnerability Scanning: Key Findings and the Importance of Regular Patching

Managed Vulnerability Scanning: Key Findings and the Importance of Regular Patching 2024-11-19 at 20:54 By There is no doubt about the value of conducting Managed Vulnerability Scanning. Trustwave has posted multiple blogs on the topic, (just check here, here, and here) for a look at how Trustwave approaches this very important cybersecurity procedure. This article is an excerpt

React to this headline:

Loading spinner

Managed Vulnerability Scanning: Key Findings and the Importance of Regular Patching Read More »

Top Database Security Tools for Enhanced Vulnerability Assessment and Compliance

Top Database Security Tools for Enhanced Vulnerability Assessment and Compliance 2024-11-14 at 22:03 By Let’s take a look at how traditional vulnerability assessment (VA) tools compare to those built specifically to assess database security. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Top Database Security Tools for Enhanced Vulnerability Assessment and Compliance Read More »

Lessons from a Honeypot with US Citizens’ Data

Lessons from a Honeypot with US Citizens’ Data 2024-11-13 at 20:15 By Radoslaw Zdonczyk and Nikita Kazymirsky Prior to last week’s US Presidential Election, the Trustwave SpiderLabs team was hard at work investigating potential risks and threats to the election system, from disinformation campaigns to nation-state actors looking to exploit vulnerabilities. This article is an

React to this headline:

Loading spinner

Lessons from a Honeypot with US Citizens’ Data Read More »

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight 2024-11-13 at 16:03 By In today’s complex cybersecurity landscape, addressing the controls within the Australian Government’s Information Security Manual (ISM) and the Essential Eight (E8) is critical when seeking to build rapport and work with the Australian Government. Australian cybersecurity regulations like

React to this headline:

Loading spinner

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight Read More »

Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers

Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers 2024-11-07 at 16:03 By This blog is the latest in a series that delves into the deep research conducted daily by the Trustwave SpiderLabs team on major threat actor groups currently operating globally. This article is an excerpt from Trustwave Blog View Original Source React

React to this headline:

Loading spinner

Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers Read More »

$500,000 HHS Fine Underscores the Need for Security and Compliance in Healthcare

$500,000 HHS Fine Underscores the Need for Security and Compliance in Healthcare 2024-11-01 at 15:02 By With the rise in cyberattacks and ransomware incidents, healthcare organizations face an increasing risk of data breaches that threaten patient privacy and HIPAA compliance. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

$500,000 HHS Fine Underscores the Need for Security and Compliance in Healthcare Read More »

Ransomware Readiness: 10 Steps Every Organization Must Take

Ransomware Readiness: 10 Steps Every Organization Must Take 2024-10-18 at 18:31 By At the end of every year, the Trustwave content team asks its in-house experts what cybersecurity topics they predict will be top of mind in the coming 12 months, and inevitably the top answer is more ransomware. This article is an excerpt from

React to this headline:

Loading spinner

Ransomware Readiness: 10 Steps Every Organization Must Take Read More »

Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack)

Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack) 2024-10-17 at 22:04 By Karl Biron Introduction In the perpetually evolving field of cybersecurity, new threats materialize daily. Attackers are on the prowl for weaknesses in infrastructure and software like a cat eyeing its helpless prey. This article is an excerpt from

React to this headline:

Loading spinner

Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack) Read More »

How Microsoft E5 Security Helps Protect Healthcare and Patient Data

How Microsoft E5 Security Helps Protect Healthcare and Patient Data 2024-10-10 at 16:01 By In the healthcare industry, safeguarding patient data is not just a regulatory requirement but a moral imperative. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

How Microsoft E5 Security Helps Protect Healthcare and Patient Data Read More »

Trustwave’s 7-Step Guide to Building a Healthcare-Focused Cybersecurity Framework

Trustwave’s 7-Step Guide to Building a Healthcare-Focused Cybersecurity Framework 2024-10-02 at 17:01 By Healthcare organizations face increasing challenges in safeguarding patient data. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Trustwave’s 7-Step Guide to Building a Healthcare-Focused Cybersecurity Framework Read More »

CMMC 2.0: A New Era of Cybersecurity for the Defense Industrial Base

CMMC 2.0: A New Era of Cybersecurity for the Defense Industrial Base 2024-09-03 at 18:01 By The Cybersecurity Maturity Model Certification (CMMC) framework is undergoing a significant transformation with the introduction of CMMC 2.0. This revamped approach aims to streamline compliance, reduce costs, and enhance the overall security posture of the defense industrial base (DIB). This article is

React to this headline:

Loading spinner

CMMC 2.0: A New Era of Cybersecurity for the Defense Industrial Base Read More »

Protecting Patient Safety: Trustwave’s Role in Healthcare Cybersecurity

Protecting Patient Safety: Trustwave’s Role in Healthcare Cybersecurity 2024-08-27 at 19:16 By The healthcare industry’s digital transformation has brought unprecedented advancements in patient care. However, it has also introduced new vulnerabilities that put sensitive patient data at risk. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Protecting Patient Safety: Trustwave’s Role in Healthcare Cybersecurity Read More »

Trustwave Data Reveals HTML Attachments, QR Codes, and BEC as Top Email Attack Vectors

Trustwave Data Reveals HTML Attachments, QR Codes, and BEC as Top Email Attack Vectors 2024-08-26 at 16:01 By The Trustwave SpiderLabs team regularly collects a trove of data while protecting clients from email-based attacks. HTML attachments, malicious QR codes, and business email compromise (BEC) are the favored attack methods. This article is an excerpt from Trustwave Blog

React to this headline:

Loading spinner

Trustwave Data Reveals HTML Attachments, QR Codes, and BEC as Top Email Attack Vectors Read More »

The Power of Multifactor Authentication and a Strong Security Culture

The Power of Multifactor Authentication and a Strong Security Culture 2024-08-22 at 16:01 By The business mantra “employees are our number one asset” is true for many reasons. Including helping protect an organization from cyber threats. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

The Power of Multifactor Authentication and a Strong Security Culture Read More »

Scroll to Top