Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

CRN Recognizes Trustwave as 2024 Top 100 Security MSP

For the fifth consecutive year, the leading channel publication CRN named Trustwave to its 2024 Managed Service Provider (MSP) 500 list in its Security 100 category. The Trustwave Global Channel Partner Program earned recognition for providing one of the industry's most extensive collections of security products and services. These offerings cater to enterprise requirements in threat detection and response, as well as vulnerability and risk management.

Short Staffed? Try Using SOAR to Augment Your Security Team

The tech world is grappling with an imbalance between skilled technical talent availability and demand, with far-reaching impacts. Combined with tightened budgets, staff shortages can leave your organization vulnerable to hacking and cyberattacks. Let’s look at just two of the industries being affected: higher education and state and local governments.

The Howler - Episode 6: Mark Manglicmot, Senior Vice President, Security Services

In this episode, our hosts sit down with Mark Manglicmot, Senior Vice President of Security Services at Arctic Wolf, who brings his fun, energetic personality to the podcast while sweating it out over hot sauce! Interested in running with the pack? Explore careers at Arctic Wolf — one of the fastest-growing and exciting cybersecurity companies in the world, to learn about how you can join our Pack, create impact, and influence what’s next in security operations.

Malware Trends According to Our Internet Security Report

Malware attacks continue to be the order of the day for businesses. The adaptability of threats and the fact that new attack models spread almost daily mean they are still very much a concern among cybersecurity professionals. The rise of malicious threat actors seems unstoppable. According to Gartner, by 2025, 45% of organizations worldwide will have experienced attacks on their software, which represents a staggering 300% growth since 2021.

Types of Privileged Accounts

Organizations separate access to specific data and administrative capabilities into different types of privileged accounts in order to securely run their operations. Some types of privileged accounts include domain administrator (admin) accounts, local admin accounts, privileged user accounts and emergency accounts. If not properly managed or secured, cybercriminals can gain unauthorized access to these privileged accounts and steal an organization’s sensitive data.

#101 - WiFi attacks and defense with Lennart Koopmann, Founder of the Nzyme Network Defense System

In this episode of The Cybersecurity Defenders Podcast, we take a close look at WiFi attack methods, and the defenses to them, with Lennart Koopmann, Founder of the Nzyme Network Defense System. Lennart Koopman, a tech enthusiast originally from Germany, now calling Houston, TX home. He began coding at a young age and chose to forgo formal education, diving straight into the world of computers after high school.

Teleport Starts Issuing CVEs

Teleport is an open source company. We develop in the open, including full disclosure of security issues in our changelogs and pull requests. We share our penetration tests and key compliance reports. Despite this, our communication to open source users and integration with automated security tooling needed improvement. We needed a standardized way to refer to our vulnerabilities so that when two people (or systems) talk about a vulnerability, they know they’re talking about the same thing.

Defending Against OAuth App-Based Attacks on Enterprise SaaS

The phenomenal growth in the adoption of software as a service (SaaS) has prompted enterprises of all sizes to move their critical data to SaaS-based applications. And as attackers tend to follow data to induce a breach, their new area of focus is enterprise SaaS. The recent Midnight Blizzard attack by nation-state actors clearly reinforces the fact that this trend has only just begun.