5 Security Things to Know for the Week of Oct. 19

November 19, 2015 | Dan Kaplan

Authorities announced they disrupted the infrastructure for Dridex, a ...

Command and Control Server Detection: Methods & Best Practices

November 19, 2015 | Garrett Gross

Botnet C&C servers issue commands in many ways Recently I discussed botnets ...

Ultrasound Tracking Beacons Making Things Sort of Creepy For Consumers

November 17, 2015 | Eric Rand

Ultrasound is supposed to be our friend. However, the security world was made ...

5 Security Things to Know for the Week of Nov. 16

November 16, 2015 | Dan Kaplan

1. U.S. authorities announced the indictments of five defendants charged in ...

Internal Scanning for PCI Compliance – Not Sexy but Necessary

November 16, 2015 | Branden Williams

Back when I ran a PCI consulting practice, I had this idea to go through all of ...

2015 SANS Analytics & Intelligence Survey

November 12, 2015 | Javvad Malik

Following on from its 2014 survey, SANS has conducted a new survey to determine ...

Questions are the answers

November 11, 2015 | Javvad Malik

How to avoid becoming the blamed victim I stare into my coffee mug. I’m not ...

Why is EMV chip-enabled credit card processing taking so long?

November 04, 2015 | Wendy Nather

The much-publicized October 1st deadline has come and gone for switching to ...

Botnet Detection and Removal: Methods & Best Practices

November 03, 2015 | Garrett Gross

Botnet 101 Before we get to best practices in botnet detection, let’s do a ...

ORX-Locker, a Web Platform to Create Ransomware

November 02, 2015 | Garrett Gross

The only thing more dangerous than cryptolocker-type ransomware in the hands of ...

Is Managed Security Right for Your Business? [Flow Chart]

October 28, 2015 | Dan Kaplan

Information security is hard to get right. A variety of factors are limiting ...

5 Security Things to Know for the Week of Oct. 26

October 26, 2015 | Dan Kaplan

Apple released scores of patches for its Mac OS X and iOS platforms, as well as ...

3 Easy Steps for Foiling Social Engineering Attacks

October 22, 2015 | Ismail Saifudin

Not too long ago, one of my fellow penetration testing consultants at Trustwave ...

8 Ways to Step Up Enterprise Endpoint Security

October 22, 2015 | Al Hartmann

Compromise of client systems and devices has become the most common entry ...

10 Resources to Turbocharge Your Security Awareness

October 20, 2015

It's National Cyber Security Awareness Month - a perfect time to emphasize the ...

MSSP Fantasy Draft Day: Who is your first round pick?

October 19, 2015 | Joe Schreiber

A lot goes into running a successful Managed Security Service Provider (MSSP). ...

Q&A: Two Trustwave SpiderLabs Experts Describe Their Upcoming SecTor Talk

October 15, 2015 | Dan Kaplan

Two of our SpiderLabs experts - Jeff Pold, director of security information ...

AdBlocking and Adblocker Blocking

October 14, 2015 | Eric Rand

Most people are familiar with the notion of an adblocker. It's pretty much what ...

Social Media Security: Your Biggest Threat is Yourself

October 13, 2015 | K.P. Kelly

I set out to write this blog to explore the security threats faced by both ...

5 Security Things to Know for the Week of Oct. 12

October 12, 2015 | Dan Kaplan

Back to the grind. Let's get started:

XCodeGhost - pervasive hack of Apple's Xcode developer toolkit

October 08, 2015 | Garrett Gross

As users, we all put a lot of trust in developers of software that we use every ...

9 Ways to Create a Security Awareness Program People Won’t Hate

October 07, 2015 | Dan Kaplan

It's become one of the great debates within information security: Do ...

Three Steps to Reduce the Cost of Implementing an Information Security Plan

October 07, 2015 | Kenneth Coe

Excerpted from a three-part series of articles.

5 Security Things to Know for the Week of Oct. 5

October 05, 2015 | Dan Kaplan

Thousands of medical devices can be hacked via the internet, according to a ...

The toughest thing about working in IT

October 04, 2015 | Javvad Malik

In its 9th year running, Spiceworld is one of the premier conferences for IT ...

National Cyber Security Awareness Month: Are You Ready?

October 01, 2015 | Deepa Chordiya

October 1st marks the start of National Cyber Security Awareness Month ...

Disclosing Vulnerabilities, Using Data Dumps & Sharing Threat Intelligence

September 29, 2015 | Javvad Malik

Executive summary In recent years, there has been an explosion in the number of ...

5 Security Things to Know for the Week of Sept. 28

September 28, 2015 | Dan Kaplan

Researchers have uncovered an emerging distributed denial-of-service (DDoS) ...