Unlocking Cyber Resilience: UK’s NCSC Drafts Code of Practice to Elevate Cybersecurity Governance in UK Businesses

February 28, 2024 | Admin

In late January, the UK’s National Cyber Security Centre (NCSC) issued the ...

LockBit Takedown: Law Enforcement Disrupts Operations, but Ransomware Threats Likely to Persist

February 21, 2024 | Ed Williams

The news that US, UK, and other international law enforcement agencies ...

Understanding Why Supply Chain Security is Often Unheeded

February 14, 2024 | Craig Searle

Many organizations downplay the critical aspect of whether their cybersecurity ...

Winning the Super Bowl of Security: An Offense-Informed Defensive Strategy

February 08, 2024 | David London, Damian Archer

We always emphasize that cybersecurity is a team sport. As millions sit down to ...

Preparing for the Impact of Artificial Intelligence's Cybersecurity

February 02, 2024 | Ed Williams

The integration of Artificial intelligence (AI) is forcing a significant ...

Federal Water and Wastewater Security Incident Response Guide Falls Short

January 29, 2024 | Kevin Kerr

This week, federal guidelines were published to assist owners and operators in ...

Top 10 Trustwave Blog Posts: Industry Threat Reports, Developing Robust Security Top of Mind for 2023

December 28, 2023 | Admin

The most popular Trustwave blog posts in 2023 were a roadmap of what concerned ...

Trustwave 2024 Predictions Part 2: Cyber Talent Shortage and the US Federal Government

December 20, 2023 | Admin

There is every reason to believe that 2024 will be an interesting year in the ...

Trustwave 2024 Cybersecurity Predictions: Artificial Intelligence and the US Presidential Election

December 19, 2023 | Admin

There is every reason to believe that 2024 may be an interesting year in the ...

Unlock the Power of Your SIEM with Co-Managed SOC

December 08, 2023 | Jason Whyte

Security information and event management (SIEM) systems play a pivotal role in ...

How Trustwave Can Assist Tribal Governments Applying for $18 Million in DHS Cybersecurity Grants

December 01, 2023 | Admin

Tribal governments are among the most underserved organizations in the US when ...

Trustwave’s Observations on the Recent Cyberattack on Aliquippa Water Treatment Plant

December 01, 2023 | Allen Numerick

The attack last week on the Municipal Water Authority in Aliquippa, Penn., that ...

The Two Sides of ChatGPT: Helping MDR Detect Blind Spots While Bolstering the Phishing Threat

November 27, 2023 | Admin

ChatGPT is proving to be something of a double-edged sword when it comes to ...

Unlocking the Power of Co-Managed SOC: A Strategic Solution for Maximizing SIEM Effectiveness and Cybersecurity Success

November 13, 2023 | Jason Whyte

Security information and event management (SIEM) systems play a pivotal role in ...

Trustwave Measures the Pros and Cons of President Biden’s Executive Order to Regulate AI Development

November 06, 2023 | Admin

President Joe Biden, on October 30, signed the first-ever Executive Order ...

Continuing the Conversation on Cybersecurity as a Business Risk

November 02, 2023 | Barry O’Connell

Board members often lack technical expertise and may not fully understand the ...

Understanding the Implications of Data Sovereignty and Why Data Residency may be a Better Choice for Your Business

October 27, 2023 | Admin

The variety of cloud services that store organizational data continues to ...

ChatGPT Update: How Security Teams and Threat Actors are Using Artificial Intelligence

September 20, 2023 | Admin

ChatGPT and other Large Learning Modules have been in use for less than a year, ...

A Multinational Effort Takes Down the Qakbot Banking Trojan

September 12, 2023 | Admin

In late August, the FBI took down and dismantled Quakbot, a banking Trojan that ...

CISO’s Corner: Cybersecurity Best Practices: Securing Employee Smartphones

September 05, 2023 | Admin

Arguably, the most used device by an organization’s employees is their ...

Managed Vulnerability Scanning Made Easy

August 30, 2023 | Jay Gill

There are few security tasks more important, yet more difficult, to conduct ...

Creating a Physical Security Standard for Your Company

August 23, 2023 | Admin

Cybersecurity is the pressing concern most organizations face when it comes to ...

Protecting Our Communities: Navigating Cyberattacks Against Municipalities and Bolstering Cybersecurity

August 14, 2023 | Admin

Municipalities are no strangers to cyberattacks, but the introduction and ready ...

5 Reasons to Pursue a Career in Cybersecurity

August 10, 2023 | Jason Whyte

Cyberattacks have not only become more frequent, sophisticated, and costly, but ...

The Risks and Rewards of ChatGPT in the Modern Business Environment

August 08, 2023 | Jason Whyte

ChatGPT continues to lead the news cycle and increase in popularity, with new ...

CISO Connect: Insights on Strategic Partnerships and Threat Readiness

August 04, 2023 | Admin

The role of the CISO is expanding alongside the growing adoption of digital ...

How the Intersection of Technology and Patient Care Creates Security Challenges

August 03, 2023 | Admin

The digital transformation of healthcare, involving patients, staff, doctors, ...

Using Asset Management to Keep a Cloud Environment Secure

July 31, 2023 | Damian Archer

In modern network environments focused on cloud technology, organizations have ...