Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Trustwave MDR: The Pivot Point That Enhances Multiple Security Tools

Several years ago, Trustwave, already a leader in Managed Security Services (MSS), recognized the shift in market needs and fully pivoted to its future as a Managed Detection and Response (MDR) leader. Trustwave's leadership chose this course because it understood that a leading cybersecurity solution provider could no longer be effective without all the weapons MDR brings to the fight.

How To Safely Shop Online

You can shop online securely by shopping on reputable websites, using strong and unique passwords when creating online shopping accounts and watching out for phishing scams. The internet has allowed retailers to sell online and provide a convenient way to shop; however, online shopping also exposes people to potential cyber attacks that can put them at risk of losing their personal and financial information.

Stories from the SOC: Proactive steps to protect customers from misconfigured MFA

Multifactor authentication, or MFA, provides users with an added layer of security when logging into web applications. Surpassing its predecessor, two-factor authentication, in 2023, MFA is a standard option for another layer of security for online accounts. . In May 2022, the Cybersecurity & Infrastructure Security Agency (CISA) published security advisory AA22-074A describing how default configurations within MFA applications are considered a vulnerability.

5 Tips to Defend Against Access Brokers This Holiday Season

The holiday season brings a shift in how people and businesses operate: Some companies may partially shut down, leaving only a skeleton crew to manage their IT environments, while others head into their busiest time of year. This seasonal change in staffing and business operations, combined with the general holiday distraction, often creates risk and makes organizations more vulnerable to cybercrime.

Becoming FedRAMP and StateRAMP Authorized Part 4: Can Continuous Monitoring Actually Give You a Leg Up?

Validating the security of your organization’s sensitive information at a single point in time with an annual risk assessment can be helpful, but what about the other 364 days of the year? If you have a cloud application and hope to sell your services to federal agencies, point-in-time assessments won’t be enough.

BlackCat Ransomware's New SEC Reporting Tactic: Turn Regulations Against Victims

Man Bites Dog: In an unusual twist in cybercrime, the ransomware group BlackCat/ALPHV is manipulating the SEC's new 4-day rule on cyber incident reporting to increase pressure on their victims. This latest maneuver highlights a sophisticated understanding of regulatory impacts in ransomware strategies.

Rego 103: Types of values and rules

This blog post series offers a gentle introduction to Rego, the policy language from the creators of the Open Policy Agent (OPA) engine. If you’re a beginner and want to get started with writing Rego policy as code, you’re in the right place. In this three-part series, we’ll go over the following: As a reminder, Rego is a declarative query language from the makers of the Open Policy Agent (OPA) framework.

Is Traditional EDR a Risk to Your Cloud Estate?

Organizations are transitioning into the cloud at warp speed, but cloud security tooling and training is lagging behind for the already stretched security teams. In an effort to bridge the gap from endpoint to cloud, teams are sometimes repurposing their traditional endpoint detection and response (EDR) and extended detection and response (“XDR) on their servers in a “good enough” approach.