Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Trustwave Uses the NIST Framework to Inform Strategy and Mitigate Cybersecurity Risk

The National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF) is one of several “gold level” standards used by public and private organizations as the basis for their cybersecurity protocols. It is also the benchmark utilized by Trustwave to protect our clients. NIST rolled out the CSF in 2014 as a set of guidelines for mitigating organizational cybersecurity risks.

Torq Joins the Cloud Security Alliance

We’re extremely happy to announce that Torq has joined the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. The CSA has more than 80,000 members worldwide and has been endorsed by the American Presidential Administration, which selected the CSA Summit as the venue for announcing the federal government’s cloud computing strategy.

The Real Cost of Cryptomining: Adversarial Analysis of TeamTNT

TeamTNT is a notorious cloud-targeting threat actor, who generates the majority of their criminal profits through cryptojacking. Sysdig TRT attributed more than $8,100 worth of cryptocurrency to TeamTNT, which was mined on stolen cloud infrastructure, costing the victims more than $430,000. The full impact of TeamTNT and similar entities is unknowable, but at $1 of profit for every $53 the victim is billed, the damage to cloud users is extensive.

Introducing Tines Labs

Tines empowers anyone to automate their manual work, regardless of complexity, without writing a single line of code. Many teams starting on their SOAR journey often don't know what processes can be automated and find it challenging to translate their manual work into software-based solutions. In cybersecurity, automating repetitive processes at scale is a relatively new idea with little public research to support it.

Traditional vs Digital Onboarding- Benefits of Online Customer Onboarding

According to a survey, due to the impact of the rupee depreciation and lower overall expenditure, financial institutions are attempting to optimise their finances as much as possible, and 83% of banks globally are focused their efforts on cost optimization.

Inside the Mind of a 'Rat' - Agent Tesla Detection and Analysis

Agent Tesla is a remote access trojan (RAT) written for the.NET framework that has knowingly been in operation since 2014. Threat actors behind this malware have leveraged many different methods to deliver their payload over time including macro enabled Word documents, Microsoft Office vulnerabilities, OLE objects and most recently, compiled HTML help files.

How Do You Know Which Data Room Is Right for Your Needs?

There are hundreds of data room vendors operating in the billion-dollar virtual data room market. It isn't difficult to understand that all the virtual data room providers may not be offering up-to-the-mark services. Some may lack in the data security department, while others may not be good in document management. In fact, the changing dynamics of different business sectors also demand customized solutions. That's why even high-end online data room software may not be what you need for your business or personal use.