Tips & Tricks

Understanding Your Network’s Security Posture

Understanding Your Network’s Security Posture 2024-05-29 at 19:16 By Organizations of all sizes need to be proactive in identifying and mitigating vulnerabilities in their networks. To help organizations better understand the value and process of a vulnerability scan, Trustwave’s Philip Pieterse, Managing Consultant for the Americas division of SpiderLabs and Dhervesh Singh, senior Security Consultant […]

React to this headline:

Loading spinner

Understanding Your Network’s Security Posture Read More »

Understanding Your Network’s Security Posture: Vulnerability Scans, Penetration Tests, and Beyond

Understanding Your Network’s Security Posture: Vulnerability Scans, Penetration Tests, and Beyond 2024-05-24 at 21:17 By Organizations of all sizes need to be proactive in identifying and mitigating vulnerabilities in their networks. To help organizations better understand the value and process of a vulnerability scan, Trustwave’s Philip Pieterse, Managing Consultant for the Americas division of SpiderLabs

React to this headline:

Loading spinner

Understanding Your Network’s Security Posture: Vulnerability Scans, Penetration Tests, and Beyond Read More »

Defining the Threat Created by the Convergence of IT and OT in Critical Infrastructure

Defining the Threat Created by the Convergence of IT and OT in Critical Infrastructure 2024-05-21 at 19:17 By Critical infrastructure facilities operated by the private and public sectors face a complex and continuously growing web of security threats that are compounded by the increasing convergence of information and operational technology (OT) in this area. This

React to this headline:

Loading spinner

Defining the Threat Created by the Convergence of IT and OT in Critical Infrastructure Read More »

Behind the MDR Curtain: The Importance of Original Threat Research

Behind the MDR Curtain: The Importance of Original Threat Research 2024-05-20 at 16:16 By Searching for a quality-managed detection and response (MDR) service provider can be daunting, with dozens of vendors to choose from. However, in its 2023 Gartner® Market Guide for Managed Detection and Response Services, Gartner confronts the challenge head-on. This article is an

React to this headline:

Loading spinner

Behind the MDR Curtain: The Importance of Original Threat Research Read More »

Trustwave Backs Multinational OT Security Recommendations to Protect Critical Infrastructure

Trustwave Backs Multinational OT Security Recommendations to Protect Critical Infrastructure 2024-05-10 at 16:31 By Kevin Kerr The Canadian, US, and UK governments issued a series of recommendations in their just-released security alert Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity, which mirror my own insights on the important topic. This article is an excerpt from Trustwave

React to this headline:

Loading spinner

Trustwave Backs Multinational OT Security Recommendations to Protect Critical Infrastructure Read More »

Using a Systematic Approach to Creating an Offensive Security Program

Using a Systematic Approach to Creating an Offensive Security Program 2024-05-03 at 17:09 By An offensive security strategy is a sophisticated and dynamic approach that extends beyond mere testing. It’s a comprehensive plan that aligns with an organization’s core mission, transforming security from a passive shield to an active spearhead. After all, in any fight, a combatant can

React to this headline:

Loading spinner

Using a Systematic Approach to Creating an Offensive Security Program Read More »

7-Step Guide to Properly Scoping an Offensive Security Program

7-Step Guide to Properly Scoping an Offensive Security Program 2024-04-26 at 16:03 By Offensive security has become a cornerstone strategy for organizations aiming to fortify their defenses against cyber threats. However, before one creates a suitably developed offensive security program, an organization must ensure it is properly scoped. This will ensure the final product is

React to this headline:

Loading spinner

7-Step Guide to Properly Scoping an Offensive Security Program Read More »

Unlocking the Power of Offensive Security: Trustwave’s Proactive Approach to Cyber Defense

Unlocking the Power of Offensive Security: Trustwave’s Proactive Approach to Cyber Defense 2024-04-19 at 16:01 By Clients often conflate Offensive Security with penetration testing, yet they serve distinct purposes within cybersecurity. Offensive Security is a broad term encompassing strategies to protect against cyber threats, while penetration testing is a specific activity where security teams test

React to this headline:

Loading spinner

Unlocking the Power of Offensive Security: Trustwave’s Proactive Approach to Cyber Defense Read More »

Effective Cybersecurity Incident Response: What to Expect from Your MDR Provider

Effective Cybersecurity Incident Response: What to Expect from Your MDR Provider 2024-04-15 at 16:01 By Companies engage with a managed detection and response (MDR) provider to help ensure they detect cyber threats before they do any damage. The “response” part of the MDR moniker is key to that effort, making it vital to determine up

React to this headline:

Loading spinner

Effective Cybersecurity Incident Response: What to Expect from Your MDR Provider Read More »

The Power of Red and Purple Team Drills in Enhancing Offensive Security Programs

The Power of Red and Purple Team Drills in Enhancing Offensive Security Programs 2024-04-12 at 16:01 By Despite investing in costly security solutions, keeping up with patches, and educating employees about suspicious emails, breaches still occur, leaving many organizations to wonder why they are vulnerable and which security areas need improvement. This article is an

React to this headline:

Loading spinner

The Power of Red and Purple Team Drills in Enhancing Offensive Security Programs Read More »

How to Ensure Proper Managed Detection and Response Coverage, Even with Rapid Onboarding

How to Ensure Proper Managed Detection and Response Coverage, Even with Rapid Onboarding 2024-03-18 at 15:17 By Christian Giuffrida Managed detection and response (MDR) providers often tout how quickly they can onboard new clients, and rapid onboarding can indeed be essential in many instances, but speed is not always paramount. What is crucial for long-term

React to this headline:

Loading spinner

How to Ensure Proper Managed Detection and Response Coverage, Even with Rapid Onboarding Read More »

Unraveling the True Cost of Ransomware Attacks and Essential Strategies for Mitigation

Unraveling the True Cost of Ransomware Attacks and Essential Strategies for Mitigation 2024-03-06 at 16:02 By Barry O’Connell A ransomware attack can demoralize or debilitate organizations quite like no other. Not only does ransomware strike a company’s morale, but it also causes massive financial losses along with reputational damage that could prove difficult to repair. This article

React to this headline:

Loading spinner

Unraveling the True Cost of Ransomware Attacks and Essential Strategies for Mitigation Read More »

Managed Detection and Response: A Cure for Cyber Alert Fatigue and Scalability Challenges

Managed Detection and Response: A Cure for Cyber Alert Fatigue and Scalability Challenges 2024-03-04 at 16:02 By Alert fatigue is a long-standing problem in cybersecurity that only increases in severity as a company grows. In that sense, alert fatigue is inextricably tied to another challenge: the need for scalability in cybersecurity. Quite often, the remedy

React to this headline:

Loading spinner

Managed Detection and Response: A Cure for Cyber Alert Fatigue and Scalability Challenges Read More »

Defending Healthcare Databases: Strategies to Safeguard Critical Information

Defending Healthcare Databases: Strategies to Safeguard Critical Information 2024-02-23 at 20:01 By The healthcare sector continues to be a primary target for threat actors, with 2023 seeing a record number  of data breaches and compromised records. While successful attacks are inevitable, it’s incumbent upon healthcare organizations to limit their exposure, and minimize the likelihood of

React to this headline:

Loading spinner

Defending Healthcare Databases: Strategies to Safeguard Critical Information Read More »

Lessons to be Learned: Attacks on Higher Education Proliferate

Lessons to be Learned: Attacks on Higher Education Proliferate 2024-02-15 at 16:02 By Trustwave SpiderLabs is wrapping up a multi-month investigation into the threats facing the education sector, across higher education, primary and secondary schools. Trustwave will post the 2024 Education Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies report on February 22, but

React to this headline:

Loading spinner

Lessons to be Learned: Attacks on Higher Education Proliferate Read More »

Let’s Get Physical with Security Requirements

Let’s Get Physical with Security Requirements 2024-01-23 at 16:01 By Jason Whyte Not every criminal illegally entering a business is looking to steal cash, equipment, or merchandise; some are looking to take something a bit more ephemeral. This scenario is particularly true for organizations, such as offices, insurance offices, or law firms not traditionally targeted

React to this headline:

Loading spinner

Let’s Get Physical with Security Requirements Read More »

How a Managed Detection and Response Service Helps Get the Most out of Microsoft Defender XDR

How a Managed Detection and Response Service Helps Get the Most out of Microsoft Defender XDR 2024-01-12 at 15:01 By For years, Microsoft has been making significant inroads in the security space, earning number-one rankings from top industry analyst firms  IDC and Forrester for its endpoint and extended detection and response (XDR) security tools. Taking full advantage of these

React to this headline:

Loading spinner

How a Managed Detection and Response Service Helps Get the Most out of Microsoft Defender XDR Read More »

Tabletop Exercises: The Key to Recovering From a Devastating Cyberattack

Tabletop Exercises: The Key to Recovering From a Devastating Cyberattack 14/12/2023 at 17:03 By The exploitation of the CitrixBleed vulnerability in Netscale by a variety of ransomware groups has led to a widespread disruption of services across several industry sectors, including financial services, healthcare and real estate. This article is an excerpt from Trustwave Blog

React to this headline:

Loading spinner

Tabletop Exercises: The Key to Recovering From a Devastating Cyberattack Read More »

Defending Against ChatGPT-Enhanced Phishing with Managed Detection and Response

Defending Against ChatGPT-Enhanced Phishing with Managed Detection and Response 13/12/2023 at 17:02 By Phishing, already a serious, ever-present threat, is getting even more pernicious thanks to ChatGPT, which enables threat actors to craft more realistic emails. Clearly, organizations need a way to fight back that recognizes the depth of the threat, including by employing managed

React to this headline:

Loading spinner

Defending Against ChatGPT-Enhanced Phishing with Managed Detection and Response Read More »

Scroll to Top