Tips & Tricks

Trustwave Adds a Twist to Cybersecurity Awareness Month: More Security!

Trustwave Adds a Twist to Cybersecurity Awareness Month: More Security! 2024-09-30 at 16:01 By October 1 marks the start of Cybersecurity Awareness Month and traditionally Trustwave has discussed the general security concepts highlighted by the Cybersecurity and Infrastructure Security Agency (CISA), and National Cybersecurity Alliance (NCSA). However, this year Trustwave will take a slightly different approach. In the same […]

React to this headline:

Loading spinner

Trustwave Adds a Twist to Cybersecurity Awareness Month: More Security! Read More »

Microsoft Copilot for Security – Proper Configuration is the Key

Microsoft Copilot for Security – Proper Configuration is the Key 2024-09-24 at 16:16 By Microsoft Copilot for Security is a powerful new artificial intelligence tool that can help companies home in on credible cybersecurity threats amid an onslaught of noise. However, significant expertise is required to configure and operate it properly and avoid unnecessary costs.

React to this headline:

Loading spinner

Microsoft Copilot for Security – Proper Configuration is the Key Read More »

Industry Analysts Call Trustwave Security Colony a Vital Tool for Enhanced Cybersecurity

Industry Analysts Call Trustwave Security Colony a Vital Tool for Enhanced Cybersecurity 2024-09-19 at 19:46 By Security Colony may not have the name recognition of some of Trustwave’s other security products and services, but when experts discuss and measure Trustwave’s strengths, this repository of knowledge is almost inevitably brought up in the conversation. For example,

React to this headline:

Loading spinner

Industry Analysts Call Trustwave Security Colony a Vital Tool for Enhanced Cybersecurity Read More »

The First Step in Creating an Offensive Security Program: Managed Vulnerability Scanning

The First Step in Creating an Offensive Security Program: Managed Vulnerability Scanning 2024-09-18 at 16:01 By An offensive security program is an excellent component of a mature cybersecurity program, but kicking off that process can be overwhelming for some organizations.  This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

The First Step in Creating an Offensive Security Program: Managed Vulnerability Scanning Read More »

Exploring an Experimental Windows Kernel Rootkit in Rust

Exploring an Experimental Windows Kernel Rootkit in Rust 2024-09-09 at 16:02 By memN0ps Around two years ago, memN0ps took the initiative to create one of the first publicly available rootkit proof of concepts (PoCs) in Rust as an experimental project, while learning a new programming language. It still lacks many features, which are relatively easy

React to this headline:

Loading spinner

Exploring an Experimental Windows Kernel Rootkit in Rust Read More »

Hypervisor Development in Rust for Security Researchers (Part 1)

Hypervisor Development in Rust for Security Researchers (Part 1) 2024-09-06 at 23:31 By memN0ps In the ever-evolving field of information security, curiosity and continuous learning drive innovation.  This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Hypervisor Development in Rust for Security Researchers (Part 1) Read More »

Active Defense and Offensive Security: The Two Sides of a Proactive Cyber Defense Program

Active Defense and Offensive Security: The Two Sides of a Proactive Cyber Defense Program 2024-08-19 at 16:02 By David Broggy Offensive security and active defense may appear at first glance as contradictory cybersecurity solutions, but when paired, they create complementary and robust protective solutions. This article is an excerpt from Trustwave Blog View Original Source

React to this headline:

Loading spinner

Active Defense and Offensive Security: The Two Sides of a Proactive Cyber Defense Program Read More »

Unleashing the Power of Microsoft Security with Trustwave

Unleashing the Power of Microsoft Security with Trustwave 2024-08-07 at 17:46 By Eric Harmon Tectonic shifts are occurring across the cyber landscape, and organizations are increasingly turning to Microsoft as a cornerstone of their security strategy. At Trustwave, we have been at the forefront of this trend, partnering with Microsoft for years to deliver unparalleled security solutions

React to this headline:

Loading spinner

Unleashing the Power of Microsoft Security with Trustwave Read More »

How to Limit Extra Costs When Implementing Microsoft E5 Security Products

How to Limit Extra Costs When Implementing Microsoft E5 Security Products 2024-08-07 at 16:01 By The Microsoft 365 E5 license gives you access to a slew of valuable Microsoft Security products that will cover you quite well for all your enterprise security monitoring needs. However, monitoring is only part of the security equation; the resources and services

React to this headline:

Loading spinner

How to Limit Extra Costs When Implementing Microsoft E5 Security Products Read More »

Trustwave Managed Vulnerability Scanning Shines a Light on Vulnerabilities

Trustwave Managed Vulnerability Scanning Shines a Light on Vulnerabilities 2024-08-06 at 16:01 By The digital landscape constantly shifts, presenting exciting opportunities and lurking threats for businesses of all sizes. In this ever-evolving environment, maintaining a secure network is no longer a luxury; it’s a necessity. However, achieving true security requires more than just firewalls and

React to this headline:

Loading spinner

Trustwave Managed Vulnerability Scanning Shines a Light on Vulnerabilities Read More »

CISOs Stop Struggling! Trustwave Security Colony – Your All-in-One Cybersecurity Arsenal

CISOs Stop Struggling! Trustwave Security Colony – Your All-in-One Cybersecurity Arsenal 2024-07-23 at 21:31 By Few repositories of cybersecurity knowledge are as broad, deep, and widely respected as Trustwave Security Colony. The industry analyst firm IDC has praised Security Colony, which sees clients and others interested in learning more about their cybersecurity posture download thousands of resources every

React to this headline:

Loading spinner

CISOs Stop Struggling! Trustwave Security Colony – Your All-in-One Cybersecurity Arsenal Read More »

De-Risk Technology Transitions and Save Money with Trustwave

De-Risk Technology Transitions and Save Money with Trustwave 2024-07-22 at 16:01 By With all the issues happening in cybersecurity technology lately, such as CrowdStrike’s software update that caused massive outages worldwide last week, it behooves all organizations to take a serious look at their security stack with an eye toward paring it down to help reduce your

React to this headline:

Loading spinner

De-Risk Technology Transitions and Save Money with Trustwave Read More »

6 Steps on How to Respond to a Data Breach Before it Ruins Your Business

6 Steps on How to Respond to a Data Breach Before it Ruins Your Business 2024-07-19 at 23:16 By Too many consumers have awoken one morning to find messages from a retailer or their bank detailing purchases made through their account of which they were unaware. While the realization that they have been hacked will

React to this headline:

Loading spinner

6 Steps on How to Respond to a Data Breach Before it Ruins Your Business Read More »

Think Pink

Think Pink 2024-07-10 at 16:01 By Tanya Secker There are some people who say, “I already conduct red team exercises, why would I need something different that is nothing more than a watered-down red team?” This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Think Pink Read More »

Unlock Zero Trust: Why Database Security is the Missing Piece

Unlock Zero Trust: Why Database Security is the Missing Piece 2024-07-09 at 16:01 By As organizations consider their journey to establishing a strong Zero Trust culture, they must adopt a data-centric approach, and this begins with ensuring database security. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Unlock Zero Trust: Why Database Security is the Missing Piece Read More »

Trustwave Webinar: CISO Debrief: Lessons Learned Moving to Microsoft E5

Trustwave Webinar: CISO Debrief: Lessons Learned Moving to Microsoft E5 2024-07-03 at 16:02 By Moving an organization to a Microsoft 365 enterprise plan, also known as an E5 license, requires extensive preparation. The best way to ensure your organization stays on the right path is to learn from those who have already made the journey.

React to this headline:

Loading spinner

Trustwave Webinar: CISO Debrief: Lessons Learned Moving to Microsoft E5 Read More »

5 Reasons Employees Hate Cybersecurity Training and 6 Tips to Turn Them Around

5 Reasons Employees Hate Cybersecurity Training and 6 Tips to Turn Them Around 2024-07-02 at 16:03 By Cybersecurity is no longer solely an IT department’s concern; it’s a company-wide responsibility. But with busy schedules and overflowing inboxes, getting employees to truly pay attention to cybersecurity training can feel like an uphill battle. This article is

React to this headline:

Loading spinner

5 Reasons Employees Hate Cybersecurity Training and 6 Tips to Turn Them Around Read More »

3 Ways to Realize Full Value from Microsoft Security Product Investments

3 Ways to Realize Full Value from Microsoft Security Product Investments 2024-07-01 at 16:01 By As companies face the challenges inherent in implementing the bevy of Microsoft Security products that are available, they may find a managed security service provider can play a key role in helping them maximize the value of their investment. This

React to this headline:

Loading spinner

3 Ways to Realize Full Value from Microsoft Security Product Investments Read More »

Why Vulnerability Scanning is an Offensive Security Program’s Secret Weapon

Why Vulnerability Scanning is an Offensive Security Program’s Secret Weapon 2024-06-21 at 16:01 By Knowing what you don’t know is the key to keeping an organization safe and the best method of doing so is with an offensive security approach that includes vulnerability scanning. By being proactive one can identify exploitable weaknesses in your own

React to this headline:

Loading spinner

Why Vulnerability Scanning is an Offensive Security Program’s Secret Weapon Read More »

Maximizing E5 Value: Prioritized Strategies and the Importance of Managed Services Partners

Maximizing E5 Value: Prioritized Strategies and the Importance of Managed Services Partners 2024-06-20 at 16:01 By Many organizations license Microsoft 365 E5 to obtain its productivity features, which makes perfect sense because that is what the tool is known for. However, E5 also shines in the security realm offering a myriad of features that will

React to this headline:

Loading spinner

Maximizing E5 Value: Prioritized Strategies and the Importance of Managed Services Partners Read More »

Scroll to Top