Tips & Tricks

MDR vs SIEM: Which is Right for Your Organization?

MDR vs SIEM: Which is Right for Your Organization? 2025-06-06 at 16:09 By The decision to buy a Security Information and Event Management (SIEM) product or outsource to a Managed Detection and Response (MDR) depends on a number of factors, including the size of your organization, the complexity of your IT infrastructure, and your overall security needs. This article […]

React to this headline:

Loading spinner

MDR vs SIEM: Which is Right for Your Organization? Read More »

Using Password 123456 is Bad, but No Password is Worse

Using Password 123456 is Bad, but No Password is Worse 2025-06-05 at 19:48 By An independent cybersecurity researcher claims to have uncovered a breach of an unnamed database containing 184 million records, with exposed information including emails, passwords, and login links. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Using Password 123456 is Bad, but No Password is Worse Read More »

From Metric to Mandate, How CIOs and CISOs Can Operationalize Microsoft Secure Score

From Metric to Mandate, How CIOs and CISOs Can Operationalize Microsoft Secure Score 2025-06-03 at 16:01 By Grant Hutchons This blog is the third part of our series on Microsoft Secure Score. Please read Part 1 and Part 2. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

From Metric to Mandate, How CIOs and CISOs Can Operationalize Microsoft Secure Score Read More »

Preventing Supply Chain Cyberattacks: Lessons from the Marks & Spencer Breach

Preventing Supply Chain Cyberattacks: Lessons from the Marks & Spencer Breach 2025-05-29 at 20:41 By Marks & Spencer’s £300M Ransomware Fallout: A sophisticated supply chain attack—likely involving phishing and social engineering—crippled operations, wiped £750M off market value, and disrupted food store logistics. Innocent Insiders Amplify Risk: Social engineering tricked a supplier’s IT staff into granting access, spotlighting

React to this headline:

Loading spinner

Preventing Supply Chain Cyberattacks: Lessons from the Marks & Spencer Breach Read More »

Navigating the Boardroom: Elevating Cybersecurity Conversations with Leadership

Navigating the Boardroom: Elevating Cybersecurity Conversations with Leadership 2025-05-27 at 16:04 By It’s almost a tradition in cybersecurity circles to say the Board of Directors’ ignorance or indifference on the topic is one of the biggest impediments an organization must overcome to have better security. This article is an excerpt from Trustwave Blog View Original Source

React to this headline:

Loading spinner

Navigating the Boardroom: Elevating Cybersecurity Conversations with Leadership Read More »

Storm-0558 and the Dangers of Cross-Tenant Token Forgery

Storm-0558 and the Dangers of Cross-Tenant Token Forgery 2025-05-21 at 23:02 By Damian Archer Modern cloud ecosystems often place a single identity provider in charge of handling logins and tokens for a wide range of customers. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Storm-0558 and the Dangers of Cross-Tenant Token Forgery Read More »

Guarding Against Dependency Attacks: Essential Strategies for Modern Application Development

Guarding Against Dependency Attacks: Essential Strategies for Modern Application Development 2025-05-16 at 19:45 By Pauline Bolaños Dependency management is one of the biggest challenges in modern software development. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Guarding Against Dependency Attacks: Essential Strategies for Modern Application Development Read More »

From Simulation to Strategy: Evolving Your Red and Purple Teaming Approach

From Simulation to Strategy: Evolving Your Red and Purple Teaming Approach 2025-05-13 at 16:01 By Red and Purple Teaming: Strategic Evolution – Discover how modern security assurance programs are shifting from one-off simulations to strategic, continuous improvement. Real-World Insights from Security Leaders – Learn from Trustwave experts on leveraging red and purple team testing to uncover security

React to this headline:

Loading spinner

From Simulation to Strategy: Evolving Your Red and Purple Teaming Approach Read More »

Migration Made Easy Using Trustwave’s Microsoft Security Migration Program

Migration Made Easy Using Trustwave’s Microsoft Security Migration Program 2025-05-05 at 23:50 By The need to purchase, install, and optimize cybersecurity technology is not up for debate. No organization is immune to the possibility of a cyberattack, which means each must be prepared to defend themselves to reduce the likelihood of a successful attack. This

React to this headline:

Loading spinner

Migration Made Easy Using Trustwave’s Microsoft Security Migration Program Read More »

Why Image Analysis is a Crucial Component of an Email Security Solution

Why Image Analysis is a Crucial Component of an Email Security Solution 2025-04-24 at 18:12 By While it’s well-known that email represents a significant source of cybersecurity threats, it’s not just the text included in emails that’s worrisome; images can be malicious as well. What’s more, images in emails may also present a threat of

React to this headline:

Loading spinner

Why Image Analysis is a Crucial Component of an Email Security Solution Read More »

Agent In the Middle – Abusing Agent Cards in the Agent-2-Agent (A2A) Protocol To ‘Win’ All the Tasks

Agent In the Middle – Abusing Agent Cards in the Agent-2-Agent (A2A) Protocol To ‘Win’ All the Tasks 2025-04-21 at 23:40 By Tom Neaves I think you’ll agree with me that growth in the AI landscape is pretty full-on at the moment. I go to sleep and wake up only to find more models have

React to this headline:

Loading spinner

Agent In the Middle – Abusing Agent Cards in the Agent-2-Agent (A2A) Protocol To ‘Win’ All the Tasks Read More »

Top Online Shopping Tips for Retailers and Consumers

Top Online Shopping Tips for Retailers and Consumers 2025-04-21 at 17:07 By Stay Safe While You Shop: Learn how to avoid common online shopping scams and protect your payment information. Expert Insights: Discover practical tips from cybersecurity professionals on secure payment methods and fraud prevention. Retailer Best Practices: Find out how businesses can strengthen their

React to this headline:

Loading spinner

Top Online Shopping Tips for Retailers and Consumers Read More »

Securing the Energy Sector: The Backbone of the UK’s AI Ambitions

Securing the Energy Sector: The Backbone of the UK’s AI Ambitions 2025-04-11 at 16:08 By Ed Williams AI and Energy Security: The UK’s Crucial Cybersecurity Challenge – Learn why safeguarding the energy sector is critical for the UK’s AI ambitions and technological leadership. Rising Cyber Threats: Ransomware and Legacy Systems in the Energy Sector –

React to this headline:

Loading spinner

Securing the Energy Sector: The Backbone of the UK’s AI Ambitions Read More »

Why Strong Passwords are Still the Best Defence Against Cyber Threats

Why Strong Passwords are Still the Best Defence Against Cyber Threats 2025-04-08 at 16:29 By Jason Whyte Weak passwords are a leading cause of cyber breaches, contributing to 86% of incidents. Strong password policies and practices significantly reduce the risk of attacks. Implementing additional measures like multifactor authentication (MFA) and password managers enhances security. After

React to this headline:

Loading spinner

Why Strong Passwords are Still the Best Defence Against Cyber Threats Read More »

Why Strong Usernames Matter for Your Online Security

Why Strong Usernames Matter for Your Online Security 2025-04-07 at 16:02 By Damian Archer Protect Your Privacy: Using the same username across accounts can expose personal information and increase the risk of extortion and data theft. Reduce Breach Impact: Unique usernames, combined with strong passwords, minimize the chances of hackers accessing multiple accounts after a

React to this headline:

Loading spinner

Why Strong Usernames Matter for Your Online Security Read More »

Phishing Attacks Are Evolving – Is Your Email Security Keeping Up?

Phishing Attacks Are Evolving – Is Your Email Security Keeping Up? 2025-04-04 at 16:02 By Craig Searle Phishing attacks cost businesses millions—learn why email security is about more than just passing a test. Strengthen your email security culture with leadership support, continuous training, and adaptive strategies. Discover how Trustwave MailMarshal enhances email security by blocking phishing threats before they reach your inbox. A

React to this headline:

Loading spinner

Phishing Attacks Are Evolving – Is Your Email Security Keeping Up? Read More »

How to Safeguard Critical Assets from the Growing Threat of Supply Chain Cyberattacks

How to Safeguard Critical Assets from the Growing Threat of Supply Chain Cyberattacks 2025-03-31 at 16:12 By Craig Searle Understanding Supply Chain Threats: Learn how cybercriminals exploit vulnerabilities in third-party vendors to gain unauthorized access to sensitive data. Real-World Cyberattack Examples: Explore high-profile supply chain breaches like the SolarWinds attack and their long-term impact on

React to this headline:

Loading spinner

How to Safeguard Critical Assets from the Growing Threat of Supply Chain Cyberattacks Read More »

Creating Operational Resilience: How to Align Compliance and Risk Management for Operational Success

Creating Operational Resilience: How to Align Compliance and Risk Management for Operational Success 2025-03-24 at 17:47 By Maddisson White Learn the Essentials of Operational Resilience: Discover what operational resilience means, why it’s a regulatory focus, and how it impacts your organization. Identify and Manage Risks Effectively: Understand your organization’s risk environment and apply proactive strategies to minimize

React to this headline:

Loading spinner

Creating Operational Resilience: How to Align Compliance and Risk Management for Operational Success Read More »

Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs)

Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs) 2025-03-24 at 15:03 By Tom Neaves The concept of “principle of least privilege” has been around for a long time. In fact, it is older than me; there are papers from the 70s that discuss it: This article is

React to this headline:

Loading spinner

Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs) Read More »

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2 2025-03-20 at 18:47 By Karl Biron In Part 1 of Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster, we uncovered the dangers of running Elasticsearch with X-Pack disabled and thus, highlighting the ease with which attackers

React to this headline:

Loading spinner

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2 Read More »

Scroll to Top