Tips & Tricks

Phishing Attacks Are Evolving – Is Your Email Security Keeping Up?

Phishing Attacks Are Evolving – Is Your Email Security Keeping Up? 2025-04-04 at 16:02 By Craig Searle Phishing attacks cost businesses millions—learn why email security is about more than just passing a test. Strengthen your email security culture with leadership support, continuous training, and adaptive strategies. Discover how Trustwave MailMarshal enhances email security by blocking phishing threats before they reach your inbox. A […]

React to this headline:

Loading spinner

Phishing Attacks Are Evolving – Is Your Email Security Keeping Up? Read More »

How to Safeguard Critical Assets from the Growing Threat of Supply Chain Cyberattacks

How to Safeguard Critical Assets from the Growing Threat of Supply Chain Cyberattacks 2025-03-31 at 16:12 By Craig Searle Understanding Supply Chain Threats: Learn how cybercriminals exploit vulnerabilities in third-party vendors to gain unauthorized access to sensitive data. Real-World Cyberattack Examples: Explore high-profile supply chain breaches like the SolarWinds attack and their long-term impact on

React to this headline:

Loading spinner

How to Safeguard Critical Assets from the Growing Threat of Supply Chain Cyberattacks Read More »

Creating Operational Resilience: How to Align Compliance and Risk Management for Operational Success

Creating Operational Resilience: How to Align Compliance and Risk Management for Operational Success 2025-03-24 at 17:47 By Maddisson White Learn the Essentials of Operational Resilience: Discover what operational resilience means, why it’s a regulatory focus, and how it impacts your organization. Identify and Manage Risks Effectively: Understand your organization’s risk environment and apply proactive strategies to minimize

React to this headline:

Loading spinner

Creating Operational Resilience: How to Align Compliance and Risk Management for Operational Success Read More »

Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs)

Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs) 2025-03-24 at 15:03 By Tom Neaves The concept of “principle of least privilege” has been around for a long time. In fact, it is older than me; there are papers from the 70s that discuss it: This article is

React to this headline:

Loading spinner

Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs) Read More »

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2 2025-03-20 at 18:47 By Karl Biron In Part 1 of Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster, we uncovered the dangers of running Elasticsearch with X-Pack disabled and thus, highlighting the ease with which attackers

React to this headline:

Loading spinner

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2 Read More »

Why Offensive Security Should Be a Top Priority, Not Just a Check-the-Box Compliance Requirement

Why Offensive Security Should Be a Top Priority, Not Just a Check-the-Box Compliance Requirement 2025-03-04 at 16:18 By Lisel Newton The following is a guest blog by Lisel Newton, Executive Director, Information Security, Risk & Compliance at Gossamer Bio. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Why Offensive Security Should Be a Top Priority, Not Just a Check-the-Box Compliance Requirement Read More »

Generative AI: Essential Insights for CISOs on Security Impacts

Generative AI: Essential Insights for CISOs on Security Impacts 2025-03-03 at 16:04 By Generative AI (GenAI) is transforming the cybersecurity landscape, requiring Chief Information Security Officers (CISOs) and their teams to adapt quickly to both opportunities and challenges, according to the Gartner® report 4 Ways Generative AI Will Impact CISOs and Their Teams[1]. This article is

React to this headline:

Loading spinner

Generative AI: Essential Insights for CISOs on Security Impacts Read More »

2025 Trustwave Risk Radar: Top Cyber Threats Facing Manufacturing

2025 Trustwave Risk Radar: Top Cyber Threats Facing Manufacturing 2025-02-26 at 16:06 By 2025 Trustwave Risk Radar Report Unveils Top Cyber Threats to Manufacturing: Discover the key cybersecurity challenges facing the manufacturing sector in 2025, including ransomware, phishing, and vulnerabilities in legacy systems and connected devices. Manufacturing Cybersecurity: IT/OT Convergence and Breach Methods Exposed: Explore two in-depth

React to this headline:

Loading spinner

2025 Trustwave Risk Radar: Top Cyber Threats Facing Manufacturing Read More »

2025 Trustwave Risk Radar Report: Top Cyber Threats Targeting the Manufacturing Sector

2025 Trustwave Risk Radar Report: Top Cyber Threats Targeting the Manufacturing Sector 2025-02-26 at 16:06 By 2025 Trustwave Risk Radar Report Unveils Top Cyber Threats to Manufacturing: Discover the key cybersecurity challenges facing the manufacturing sector in 2025, including ransomware, phishing, and vulnerabilities in legacy systems and connected devices. Manufacturing Cybersecurity: IT/OT Convergence and Breach Methods

React to this headline:

Loading spinner

2025 Trustwave Risk Radar Report: Top Cyber Threats Targeting the Manufacturing Sector Read More »

How the Trustwave NIS2 Maturity Accelerator Can Help Navigate NIS2 Compliance

How the Trustwave NIS2 Maturity Accelerator Can Help Navigate NIS2 Compliance 2025-02-25 at 16:15 By The European Union (EU) Network and Information Security Directive 2 (NIS2) introduces stricter cybersecurity requirements than its predecessor, the original NIS Directive. With the compliance deadline fast approaching, in-scope organizations must take proactive steps to ensure they have enacted NIS2

React to this headline:

Loading spinner

How the Trustwave NIS2 Maturity Accelerator Can Help Navigate NIS2 Compliance Read More »

Unlock the Full Potential of Microsoft FastTrack with Trustwave

Unlock the Full Potential of Microsoft FastTrack with Trustwave 2025-02-19 at 22:48 By Unlock Hidden Benefits: If your company uses Microsoft 365, you may already have free access to Microsoft FastTrack—streamlining deployment and adoption at no extra cost. Maximize Your Investment: FastTrack provides expert guidance for deploying Microsoft Teams, Microsoft Defender, Microsoft Viva, and more—helping you get

React to this headline:

Loading spinner

Unlock the Full Potential of Microsoft FastTrack with Trustwave Read More »

Building a Sustainable PCI DSS 4.0 Compliance Culture

Building a Sustainable PCI DSS 4.0 Compliance Culture 2025-02-18 at 23:34 By Craig Searle PCI DSS 4.0: Mastering Targeted Risk Analysis (TRA) for Sustainable Compliance: This title highlights the key update (4.0) and a core concept (TRA), making it clear what the blog post is about. It also emphasizes the importance of long-term compliance. Navigating PCI

React to this headline:

Loading spinner

Building a Sustainable PCI DSS 4.0 Compliance Culture Read More »

Accelerate Your Journey with the Microsoft End Customer Investment Funds (ECIF) Program

Accelerate Your Journey with the Microsoft End Customer Investment Funds (ECIF) Program 2025-01-31 at 18:48 By As a long-time Microsoft partner, Trustwave is well-positioned to help an organization tap into the Microsoft End Customer Investment Funds (ECIF) Program. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Accelerate Your Journey with the Microsoft End Customer Investment Funds (ECIF) Program Read More »

How Trustwave’s Fusion Platform Analyzes Ransomware Tactics in the Energy Sector: A Comprehensive Overview

How Trustwave’s Fusion Platform Analyzes Ransomware Tactics in the Energy Sector: A Comprehensive Overview 2025-01-30 at 16:04 By Trustwave SpiderLabs has multiple methods and tools available to keep its teams apprised of the tactics, techniques, and procedures (TTPs) threat groups utilize during an attack, but perhaps the most useful is our cloud-native Fusion dashboard. This

React to this headline:

Loading spinner

How Trustwave’s Fusion Platform Analyzes Ransomware Tactics in the Energy Sector: A Comprehensive Overview Read More »

Navigating DORA Compliance: A Roadmap to Operational Resilience with Trustwave

Navigating DORA Compliance: A Roadmap to Operational Resilience with Trustwave 2025-01-14 at 16:03 By The Digital Operational Resilience Act (DORA) is poised to reshape the European financial landscape, demanding a robust defense against cyber threats and operational disruptions and Trustwave is putting the pedal to the metal to prepare clients with our DORA Readiness Accelerator

React to this headline:

Loading spinner

Navigating DORA Compliance: A Roadmap to Operational Resilience with Trustwave Read More »

Why Vulnerability Scanning Alone Isn’t Enough: The Case for Penetration Testing

Why Vulnerability Scanning Alone Isn’t Enough: The Case for Penetration Testing 2025-01-10 at 16:11 By Grayson Lenik Organizations today face a rapidly evolving threat landscape, and as they plan their cybersecurity strategy and budgets, many may struggle with a key question: If I’m conducting regular vulnerability scans, and patching the vulnerabilities I identify, do I

React to this headline:

Loading spinner

Why Vulnerability Scanning Alone Isn’t Enough: The Case for Penetration Testing Read More »

Black Friday Cybersecurity Checklist: Safeguard Your Store and Customer Data

Black Friday Cybersecurity Checklist: Safeguard Your Store and Customer Data 2024-11-21 at 16:03 By The holiday season starts on Black Friday and is the busiest time of year for retailers, but it’s also a peak period for cybercriminals who look to exploit vulnerabilities in business of all sizes. This article is an excerpt from Trustwave

React to this headline:

Loading spinner

Black Friday Cybersecurity Checklist: Safeguard Your Store and Customer Data Read More »

10 Tips to Help Holiday Shoppers to Stay Safe from Scams and Cyberattacks

10 Tips to Help Holiday Shoppers to Stay Safe from Scams and Cyberattacks 2024-11-20 at 19:03 By The holiday season is here, and with it comes the thrill of Black Friday deals and holiday shopping sprees. But it’s not just shoppers who are gearing up – cybercriminals are ready to take advantage of the holiday

React to this headline:

Loading spinner

10 Tips to Help Holiday Shoppers to Stay Safe from Scams and Cyberattacks Read More »

CMMC 2.0, CORIE, DORA: Navigating Global Cybersecurity and Resilience Standard

CMMC 2.0, CORIE, DORA: Navigating Global Cybersecurity and Resilience Standard 2024-11-08 at 17:07 By Cybersecurity and operational resilience are paramount for organizations, especially those handling sensitive information. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

CMMC 2.0, CORIE, DORA: Navigating Global Cybersecurity and Resilience Standard Read More »

Cybersecurity Awareness Month: 7 Ways to Treat Yourself to a Safer Year

Cybersecurity Awareness Month: 7 Ways to Treat Yourself to a Safer Year 2024-10-28 at 18:19 By As Cybersecurity Awareness Month 2024 draws to a close, let’s take a few minutes and cover one more topic. The need to be cybersecurity aware 24/7/365. This article is an excerpt from Trustwave Blog View Original Source React to

React to this headline:

Loading spinner

Cybersecurity Awareness Month: 7 Ways to Treat Yourself to a Safer Year Read More »