Tips & Tricks

Behind the MDR Curtain: The Importance of Original Threat Research

Behind the MDR Curtain: The Importance of Original Threat Research 2024-05-20 at 16:16 By Searching for a quality-managed detection and response (MDR) service provider can be daunting, with dozens of vendors to choose from. However, in its 2023 Gartner® Market Guide for Managed Detection and Response Services, Gartner confronts the challenge head-on. This article is an […]

React to this headline:

Loading spinner

Behind the MDR Curtain: The Importance of Original Threat Research Read More »

Trustwave Backs Multinational OT Security Recommendations to Protect Critical Infrastructure

Trustwave Backs Multinational OT Security Recommendations to Protect Critical Infrastructure 2024-05-10 at 16:31 By Kevin Kerr The Canadian, US, and UK governments issued a series of recommendations in their just-released security alert Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity, which mirror my own insights on the important topic. This article is an excerpt from Trustwave

React to this headline:

Loading spinner

Trustwave Backs Multinational OT Security Recommendations to Protect Critical Infrastructure Read More »

Using a Systematic Approach to Creating an Offensive Security Program

Using a Systematic Approach to Creating an Offensive Security Program 2024-05-03 at 17:09 By An offensive security strategy is a sophisticated and dynamic approach that extends beyond mere testing. It’s a comprehensive plan that aligns with an organization’s core mission, transforming security from a passive shield to an active spearhead. After all, in any fight, a combatant can

React to this headline:

Loading spinner

Using a Systematic Approach to Creating an Offensive Security Program Read More »

7-Step Guide to Properly Scoping an Offensive Security Program

7-Step Guide to Properly Scoping an Offensive Security Program 2024-04-26 at 16:03 By Offensive security has become a cornerstone strategy for organizations aiming to fortify their defenses against cyber threats. However, before one creates a suitably developed offensive security program, an organization must ensure it is properly scoped. This will ensure the final product is

React to this headline:

Loading spinner

7-Step Guide to Properly Scoping an Offensive Security Program Read More »

Unlocking the Power of Offensive Security: Trustwave’s Proactive Approach to Cyber Defense

Unlocking the Power of Offensive Security: Trustwave’s Proactive Approach to Cyber Defense 2024-04-19 at 16:01 By Clients often conflate Offensive Security with penetration testing, yet they serve distinct purposes within cybersecurity. Offensive Security is a broad term encompassing strategies to protect against cyber threats, while penetration testing is a specific activity where security teams test

React to this headline:

Loading spinner

Unlocking the Power of Offensive Security: Trustwave’s Proactive Approach to Cyber Defense Read More »

Effective Cybersecurity Incident Response: What to Expect from Your MDR Provider

Effective Cybersecurity Incident Response: What to Expect from Your MDR Provider 2024-04-15 at 16:01 By Companies engage with a managed detection and response (MDR) provider to help ensure they detect cyber threats before they do any damage. The “response” part of the MDR moniker is key to that effort, making it vital to determine up

React to this headline:

Loading spinner

Effective Cybersecurity Incident Response: What to Expect from Your MDR Provider Read More »

The Power of Red and Purple Team Drills in Enhancing Offensive Security Programs

The Power of Red and Purple Team Drills in Enhancing Offensive Security Programs 2024-04-12 at 16:01 By Despite investing in costly security solutions, keeping up with patches, and educating employees about suspicious emails, breaches still occur, leaving many organizations to wonder why they are vulnerable and which security areas need improvement. This article is an

React to this headline:

Loading spinner

The Power of Red and Purple Team Drills in Enhancing Offensive Security Programs Read More »

How to Ensure Proper Managed Detection and Response Coverage, Even with Rapid Onboarding

How to Ensure Proper Managed Detection and Response Coverage, Even with Rapid Onboarding 2024-03-18 at 15:17 By Christian Giuffrida Managed detection and response (MDR) providers often tout how quickly they can onboard new clients, and rapid onboarding can indeed be essential in many instances, but speed is not always paramount. What is crucial for long-term

React to this headline:

Loading spinner

How to Ensure Proper Managed Detection and Response Coverage, Even with Rapid Onboarding Read More »

Unraveling the True Cost of Ransomware Attacks and Essential Strategies for Mitigation

Unraveling the True Cost of Ransomware Attacks and Essential Strategies for Mitigation 2024-03-06 at 16:02 By Barry O’Connell A ransomware attack can demoralize or debilitate organizations quite like no other. Not only does ransomware strike a company’s morale, but it also causes massive financial losses along with reputational damage that could prove difficult to repair. This article

React to this headline:

Loading spinner

Unraveling the True Cost of Ransomware Attacks and Essential Strategies for Mitigation Read More »

Managed Detection and Response: A Cure for Cyber Alert Fatigue and Scalability Challenges

Managed Detection and Response: A Cure for Cyber Alert Fatigue and Scalability Challenges 2024-03-04 at 16:02 By Alert fatigue is a long-standing problem in cybersecurity that only increases in severity as a company grows. In that sense, alert fatigue is inextricably tied to another challenge: the need for scalability in cybersecurity. Quite often, the remedy

React to this headline:

Loading spinner

Managed Detection and Response: A Cure for Cyber Alert Fatigue and Scalability Challenges Read More »

Defending Healthcare Databases: Strategies to Safeguard Critical Information

Defending Healthcare Databases: Strategies to Safeguard Critical Information 2024-02-23 at 20:01 By The healthcare sector continues to be a primary target for threat actors, with 2023 seeing a record number  of data breaches and compromised records. While successful attacks are inevitable, it’s incumbent upon healthcare organizations to limit their exposure, and minimize the likelihood of

React to this headline:

Loading spinner

Defending Healthcare Databases: Strategies to Safeguard Critical Information Read More »

Lessons to be Learned: Attacks on Higher Education Proliferate

Lessons to be Learned: Attacks on Higher Education Proliferate 2024-02-15 at 16:02 By Trustwave SpiderLabs is wrapping up a multi-month investigation into the threats facing the education sector, across higher education, primary and secondary schools. Trustwave will post the 2024 Education Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies report on February 22, but

React to this headline:

Loading spinner

Lessons to be Learned: Attacks on Higher Education Proliferate Read More »

Let’s Get Physical with Security Requirements

Let’s Get Physical with Security Requirements 2024-01-23 at 16:01 By Jason Whyte Not every criminal illegally entering a business is looking to steal cash, equipment, or merchandise; some are looking to take something a bit more ephemeral. This scenario is particularly true for organizations, such as offices, insurance offices, or law firms not traditionally targeted

React to this headline:

Loading spinner

Let’s Get Physical with Security Requirements Read More »

How a Managed Detection and Response Service Helps Get the Most out of Microsoft Defender XDR

How a Managed Detection and Response Service Helps Get the Most out of Microsoft Defender XDR 2024-01-12 at 15:01 By For years, Microsoft has been making significant inroads in the security space, earning number-one rankings from top industry analyst firms  IDC and Forrester for its endpoint and extended detection and response (XDR) security tools. Taking full advantage of these

React to this headline:

Loading spinner

How a Managed Detection and Response Service Helps Get the Most out of Microsoft Defender XDR Read More »

Tabletop Exercises: The Key to Recovering From a Devastating Cyberattack

Tabletop Exercises: The Key to Recovering From a Devastating Cyberattack 14/12/2023 at 17:03 By The exploitation of the CitrixBleed vulnerability in Netscale by a variety of ransomware groups has led to a widespread disruption of services across several industry sectors, including financial services, healthcare and real estate. This article is an excerpt from Trustwave Blog

React to this headline:

Loading spinner

Tabletop Exercises: The Key to Recovering From a Devastating Cyberattack Read More »

Defending Against ChatGPT-Enhanced Phishing with Managed Detection and Response

Defending Against ChatGPT-Enhanced Phishing with Managed Detection and Response 13/12/2023 at 17:02 By Phishing, already a serious, ever-present threat, is getting even more pernicious thanks to ChatGPT, which enables threat actors to craft more realistic emails. Clearly, organizations need a way to fight back that recognizes the depth of the threat, including by employing managed

React to this headline:

Loading spinner

Defending Against ChatGPT-Enhanced Phishing with Managed Detection and Response Read More »

Managing Risk Appetite: Balancing Cybersecurity and Business Growth

Managing Risk Appetite: Balancing Cybersecurity and Business Growth 07/11/2023 at 06:47 By Ed Williams Determining, dealing with, and accepting a certain level of risk will always be a top priority for the members of any C-Suite. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Managing Risk Appetite: Balancing Cybersecurity and Business Growth Read More »

Final Cybersecurity Awareness Month Thoughts: Don’t Get Hooked By a Phishing Email

Final Cybersecurity Awareness Month Thoughts: Don’t Get Hooked By a Phishing Email 31/10/2023 at 08:02 By We close out Cybersecurity Awareness Month for 2023 with a few final points that show that a company’s security is a team sport, one in which everyone must participate. This article is an excerpt from Trustwave Blog View Original

React to this headline:

Loading spinner

Final Cybersecurity Awareness Month Thoughts: Don’t Get Hooked By a Phishing Email Read More »

10 Dynamic Principles for Crafting a Robust Database Security Strategy

10 Dynamic Principles for Crafting a Robust Database Security Strategy 05/10/2023 at 00:02 By The digital world relies on data, which because of its considerable value, is constantly targeted by skilled cybercriminals who have spent years developing methods and tools to gain access to even the most secure databases. This article is an excerpt from

React to this headline:

Loading spinner

10 Dynamic Principles for Crafting a Robust Database Security Strategy Read More »

Scroll to Top