The 15 Biggest Things Trustwave Did in 2015

December 30, 2015 | Admin

With companies of all sizes negotiating digital minefields on a daily basis, ...

How Retailers Can Avoid Hidden Malware Risks

December 10, 2015 | Jane Dotsenko

As retailers prepare for the holiday surge in online sales, hackers are equally ...

Q&A: Two Trustwave SpiderLabs Experts Describe Their Upcoming SecTor Talk

October 15, 2015 | Dan Kaplan

Two of our SpiderLabs experts - Jeff Pold, director of security information ...

Why EMV is Important, But Makes You No Less Immune to a Breach

September 24, 2015 | Dan Kaplan

Starting next week, brick-and-mortar merchants in the United States must be ...

When Do You Know if an MSSP is Right for You?

August 14, 2015 | Chris Harget

If your job is securing IT, you may have mixed feelings about bringing in a ...

Why SIEM Has Failed So Many – And What You Can Do About It

August 11, 2015 | Thomas Savage

Organizations worldwide are well past the point of believing that ...

Neglect These 'Second-Tier' Vulnerabilities at Your Own Risk

July 08, 2015 | Dan Kaplan

By now you should be familiar with the "mega" vulnerabilities that were ...

What Garlic Has To Do with Information Security

June 26, 2015 | John Randall

I like garlic. I really do. But somewhere along the way, the pungent herb ...

What You Can Learn from the Ridiculous Money That Cybercriminals Make

June 11, 2015 | Dan Kaplan

Statistics abound regarding the cost businesses bear due to attacks and ...

7 Rookie Security Mistakes Made by Health Care Organizations

April 13, 2015 | Dan Kaplan

Health care entities often operate several steps behind criminal hackers and ...

7 Unromantic Security Comments That Could Ruin Valentine's Day

February 12, 2015 | Dan Kaplan

If you're out with that special someone this Valentine's Day weekend, and he or ...

4 Undeniable Reasons to Take Your Email Security to the Cloud

January 14, 2015 | Dan Kaplan

A clear progression has taken shape in information security. As organizations ...

Why it's the Perfect Time for a Security Intervention

January 07, 2015 | Dan Kaplan

2014 was a year of reckoning for IT and security professionals globally. Like ...

A Simple Fix for the Cybersecurity Skills Shortage

November 10, 2014 | Dan Kaplan

Data breaches are earning front-page headlines on a near-daily basis, yet many ...

4 Scary Truths We Observed During National Cyber Security Awareness Month

October 29, 2014 | Dan Kaplan

Friday is Halloween - and the ghosts and goblins will be out in full force in ...

6 Technologies That Will Expand Your Anti-Malware Arsenal

September 24, 2014 | Dan Kaplan

Why Preventing Retail Breaches Requires a Team Effort

September 04, 2014 | Dan Kaplan

2014 is very much shaping up as the Year of the Retail Breach - nary a week ...

Yes, Your Password is Easy to Crack

August 07, 2014 | Dan Kaplan

Earlier this year, we told you about a password analysis we conducted on the ...

Sandboxes May Not Be Much Fun for Your Network

July 30, 2014 | Steve Brunetto

While products that implement sandboxing techniques can detect zero-day ...

5 Reasons to Go Beyond HIPAA Compliance

July 11, 2014 | Dan Kaplan

With the next 12 months promising to bring "especially aggressive punishment" ...

A Simple Strategy to Make Life Harder for Hackers

July 08, 2014 | John Randall

In 2004, Bill Gates predicted that the death of the password was imminent. Yet, ...

3 Warning Signs You May Be Drowning in Apps and Placing Security at Risk

June 27, 2014 | Dan Kaplan

Web, mobile and cloud applications are insanely popular - both from an end-user ...

Despite All of the Breaches, Why Aren't Passwords Getting Any Stronger?

June 20, 2014 | Dan Kaplan

Security companies like ours offer an assortment of technologies and services ...

3 Application Lifecycle Phases You Must Security Test

June 17, 2014 | Grant Swanson

Data breaches are no joke. Incidents involving the loss or exposure of ...

Why 'Comprehensive' Application Security Is More Important Than Ever

June 10, 2014 | Chris Harget

Ask an IT person why they scan certain applications for vulnerabilities, and ...

March Madness? More like March Malware-ness

March 20, 2014 | Abby Ross

We know March Madness is here because our phones are ringing with security ...

Has Cyber Security Awareness Improved Among the Largest U.K. Businesses?

March 19, 2014 | Tom Neaves

In November 2011, the U.K. government launched its Cyber Security Strategy in ...

How to Design a Defense Against Point-of-Sale Malware Attacks

March 07, 2014 | Dan Kaplan

Despite increasingly tighter data protection standards, more advanced security ...