Perspectives

The Power of Multifactor Authentication and a Strong Security Culture

The Power of Multifactor Authentication and a Strong Security Culture 2024-08-22 at 16:01 By The business mantra “employees are our number one asset” is true for many reasons. Including helping protect an organization from cyber threats. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

The Power of Multifactor Authentication and a Strong Security Culture Read More »

When Patching Goes Wrong: Lessons Learned from The CrowdStrike Incident

When Patching Goes Wrong: Lessons Learned from The CrowdStrike Incident 2024-08-16 at 16:02 By Patches are a way of life for any network administrator and are the most efficient method in place to ensure systems are running the most up-to-date and secure versions of their various software applications. For the most part, updates take place

React to this headline:

Loading spinner

When Patching Goes Wrong: Lessons Learned from The CrowdStrike Incident Read More »

Balancing Escalating Security Concerns While Pursuing Business Innovation

Balancing Escalating Security Concerns While Pursuing Business Innovation 2024-08-09 at 18:16 By Jason Whyte Australia’s business leaders face a complex and rapidly evolving market landscape that is highly competitive, globally interconnected, and demands a proactive approach to risk management. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Balancing Escalating Security Concerns While Pursuing Business Innovation Read More »

CISO Webinar Outlines Trustwave’s Journey to Adopting Microsoft E5 Security Offerings

CISO Webinar Outlines Trustwave’s Journey to Adopting Microsoft E5 Security Offerings 2024-07-29 at 16:01 By The decision on whether to implement the Microsoft Security offerings available with the Microsoft 365 E5 license certainly involves deep security discussions, but it’s also a business decision. In that respect, this process allows security leaders to engage with their CFO and

React to this headline:

Loading spinner

CISO Webinar Outlines Trustwave’s Journey to Adopting Microsoft E5 Security Offerings Read More »

Achieving High Organizational Security Scores Using Microsoft Secure Score

Achieving High Organizational Security Scores Using Microsoft Secure Score 2024-06-24 at 16:01 By Grant Hutchons As businesses engage in increasingly complex and interdependent relationships, ensuring all parties maintain high cybersecurity standards becomes essential. One method to achieve this is using security scores, which are similar to personal credit scores, and assessing the efficacy of an

React to this headline:

Loading spinner

Achieving High Organizational Security Scores Using Microsoft Secure Score Read More »

UK Must Prioritize Cybersecurity Governance Amidst Rising Threat of Cybercrime

UK Must Prioritize Cybersecurity Governance Amidst Rising Threat of Cybercrime 2024-04-30 at 16:16 By Barry O’Connell If the UK is serious about digitizing the economy, then cybersecurity is priority number one and the first step should be to take a hard look at the UK Government’s recently released draft code of practice for cybersecurity governance. This

React to this headline:

Loading spinner

UK Must Prioritize Cybersecurity Governance Amidst Rising Threat of Cybercrime Read More »

Behind the Scenes of the Change Healthcare Ransomware Attack Cyber Gang Dispute

Behind the Scenes of the Change Healthcare Ransomware Attack Cyber Gang Dispute 2024-04-18 at 16:01 By Greg Monson Editor’s Note – The situation with the Change Healthcare cyberattack is changing frequently. The information in this blog is current as of April 16. We will update the blog as needed. This article is an excerpt from

React to this headline:

Loading spinner

Behind the Scenes of the Change Healthcare Ransomware Attack Cyber Gang Dispute Read More »

Managed Detection and Response Providers Shouldn’t Lay Claim to Your Custom Content

Managed Detection and Response Providers Shouldn’t Lay Claim to Your Custom Content 2024-04-04 at 16:02 By Christian Giuffrida Among the due diligence a company should perform when signing with a managed detection and response (MDR) provider, one item that may not be top of mind is who owns custom content developed during the service. You

React to this headline:

Loading spinner

Managed Detection and Response Providers Shouldn’t Lay Claim to Your Custom Content Read More »

Why Offensive Security is a Necessity for a Dynamic Threat Landscape

Why Offensive Security is a Necessity for a Dynamic Threat Landscape 2024-03-29 at 15:17 By Today’s ever-shifting threat landscape demands a multi-pronged approach to cybersecurity. Organizations must go beyond mere compliance by employing a combination of offensive security tactics and frequent testing. This empowers them to effectively manage organizational exposure and protect critical assets from

React to this headline:

Loading spinner

Why Offensive Security is a Necessity for a Dynamic Threat Landscape Read More »

Unlocking Cyber Resilience: UK’s NCSC Drafts Code of Practice to Elevate Cybersecurity Governance in UK Businesses

Unlocking Cyber Resilience: UK’s NCSC Drafts Code of Practice to Elevate Cybersecurity Governance in UK Businesses 2024-02-28 at 16:03 By In late January, the UK’s National Cyber Security Centre (NCSC) issued the draft of its Code of Practice on Cybersecurity Governance. The document’s goal is to raise the profile of cyber issues with organizational directors

React to this headline:

Loading spinner

Unlocking Cyber Resilience: UK’s NCSC Drafts Code of Practice to Elevate Cybersecurity Governance in UK Businesses Read More »

Understanding Why Supply Chain Security is Often Unheeded

Understanding Why Supply Chain Security is Often Unheeded 2024-02-14 at 15:01 By Many organizations downplay the critical aspect of whether their cybersecurity provider has the ability to properly vet a third-party vendor’s cybersecurity posture. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Understanding Why Supply Chain Security is Often Unheeded Read More »

Winning the Super Bowl of Security: An Offense-Informed Defense Strategy

Winning the Super Bowl of Security: An Offense-Informed Defense Strategy 2024-02-08 at 16:02 By David London, Damian Archer We always emphasize that cybersecurity is a team sport. As millions sit down to watch the Kansas City Chiefs and the San Francisco 49ers face off in Super Bowl LVIII on February 11 in Las Vegas, there

React to this headline:

Loading spinner

Winning the Super Bowl of Security: An Offense-Informed Defense Strategy Read More »

Preparing for the Impact of Artificial Intelligence’s Cybersecurity

Preparing for the Impact of Artificial Intelligence’s Cybersecurity 2024-02-02 at 18:02 By Ed Williams The integration of Artificial intelligence (AI) is forcing a significant transformation in the business operations landscape. Through automation, data analysis and predictive capabilities, AI is reshaping how businesses operate as companies look to spur productivity. This article is an excerpt from

React to this headline:

Loading spinner

Preparing for the Impact of Artificial Intelligence’s Cybersecurity Read More »

Trustwave 2024 Predictions Part 2: Cyber Talent Shortage and the US Federal Government

Trustwave 2024 Predictions Part 2: Cyber Talent Shortage and the US Federal Government 20/12/2023 at 17:02 By There is every reason to believe that 2024 will be an interesting year in the cybersecurity space, making it difficult to foresee what might transpire. However, Trustwave’s leadership is up to the task. This article is an excerpt

React to this headline:

Loading spinner

Trustwave 2024 Predictions Part 2: Cyber Talent Shortage and the US Federal Government Read More »

Threat Groups Targeting IT Over OT and How Manufacturers Can Safeguard Both Worlds

Threat Groups Targeting IT Over OT and How Manufacturers Can Safeguard Both Worlds 18/12/2023 at 17:17 By When it comes to securing the manufacturing sector, the consensus is that these organizations should focus on securing their operational technology (OT) from cyberattacks, but this isn’t the full picture. This article is an excerpt from Trustwave Blog

React to this headline:

Loading spinner

Threat Groups Targeting IT Over OT and How Manufacturers Can Safeguard Both Worlds Read More »

Unlock the Power of Your SIEM with Co-Managed SOC

Unlock the Power of Your SIEM with Co-Managed SOC 08/12/2023 at 17:02 By Jason Whyte Security information and event management (SIEM) systems play a pivotal role in cybersecurity: they offer a unified solution for gathering and assessing alerts from a plethora of security tools, network structures, and software applications. This article is an excerpt from

React to this headline:

Loading spinner

Unlock the Power of Your SIEM with Co-Managed SOC Read More »

Trustwave’s Observations on the Recent Cyberattack on Aliquippa Water Treatment Plant

Trustwave’s Observations on the Recent Cyberattack on Aliquippa Water Treatment Plant 01/12/2023 at 23:47 By Allen Numerick The attack last week on the Municipal Water Authority in Aliquippa, Penn., that gave threat actors access to a portion of the facility’s pumping equipment has spurred the Cybersecurity & Infrastructure Security Agency (CISA)and WaterISAC to each issue

React to this headline:

Loading spinner

Trustwave’s Observations on the Recent Cyberattack on Aliquippa Water Treatment Plant Read More »

How Trustwave Can Assist Tribal Governments Applying for $18 Million in DHS Cybersecurity Grants

How Trustwave Can Assist Tribal Governments Applying for $18 Million in DHS Cybersecurity Grants 01/12/2023 at 17:03 By Tribal governments are among the most underserved organizations in the US when it comes to cybersecurity preparation, with threat actors striking multiple tribes with a variety of cyberattacks. This article is an excerpt from Trustwave Blog View

React to this headline:

Loading spinner

How Trustwave Can Assist Tribal Governments Applying for $18 Million in DHS Cybersecurity Grants Read More »

The Two Sides of ChatGPT: Helping MDR Detect Blind Spots While Bolstering the Phishing Threat

The Two Sides of ChatGPT: Helping MDR Detect Blind Spots While Bolstering the Phishing Threat 27/11/2023 at 17:02 By Karl Sigler ChatGPT is proving to be something of a double-edged sword when it comes to cybersecurity. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

The Two Sides of ChatGPT: Helping MDR Detect Blind Spots While Bolstering the Phishing Threat Read More »

Unlocking the Power of Co-Managed SOC: A Strategic Solution for Maximizing SIEM Effectiveness and Cybersecurity Success

Unlocking the Power of Co-Managed SOC: A Strategic Solution for Maximizing SIEM Effectiveness and Cybersecurity Success 13/11/2023 at 17:02 By Jason Whyte Security information and event management (SIEM) systems play a pivotal role in cybersecurity: they offer a unified solution for gathering and assessing alerts from a plethora of security tools, network structures, and software

React to this headline:

Loading spinner

Unlocking the Power of Co-Managed SOC: A Strategic Solution for Maximizing SIEM Effectiveness and Cybersecurity Success Read More »

Scroll to Top