Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What You Need to Know about the Data Breach MC2 Data

Founded in 2018, MC2 Data is based in Florida and specializes in background check services. MC2 aggregates data from several records to provide background check services to landlords, employers, and other organizations. The company is said to operate other services, including PeopleSearch USA, PrivateReports, PrivateRecords.net, PeopleSearcher, and ThePeopleSearchers.

Protect Your Personal Information: Ensuring Privacy and Security

Data is everywhere in the digital realm, on cell phones, tablets, PCs, and Macs. Even smart TVs, game controllers, and home appliances have data now. With too much data being generated, should we protect all of this content or specific items relevant to protecting their personal security? Everyone using smart devices must understand how data is generated and how long we should keep the data. How can you determine if someone has compromised your data?

MSSP Alert, CRN, and Comparably Honor Trustwave in 2024

Cybersecurity industry analysts were not the only group touting Trustwave. In 2024, a variety of media and workplace reviewing sources hailed Trustwave not only for our security solutions but as a great place to work. Because Trustwave is proud of how our employees perceive us let's take a look at the awards issued by Comparably, a leading workplace culture and compensation monitoring employee review platform. Trustwave was awarded three Comparably awards in 2024.

Uncovering the Hidden Dangers: Corporate Emails on Third-Party Websites

Employees often need to access various online services for work and personal purposes. Whether signing up for industry newsletters, registering for webinars, or using online tools, a corporate email address is a convenient way to manage professional communication. However, this seemingly harmless habit can expose employees and their organizations to significant risks.

Do You Need More Than One PAM Solution?

No, you don’t need more than one Privileged Access Management (PAM) solution to protect your organization if you find one that encompasses zero-knowledge security, granular access control, session management and automated password rotation. Previously, your organization may have needed multiple PAM solutions for various tasks; however, KeeperPAM is a unified platform that provides centralized cloud management of privileged access, passwords, secrets and connections.

"Get Beyond Security Awareness Training" Does Not Mean Forgetting About It

KnowBe4 is a big believer in focusing on decreasing human risk as the best way to decrease cybersecurity risk in most environments. A big part of decreasing human risk is using effective security awareness training (SAT). You do not want to just focus on SAT, but SAT is a big part of decreasing human risk. To be sure, your human risk management projects need to be broadly focused on more than SAT. We agree.

CIO POV: Beware of Deepfakes Infiltrating the Enterprise

Many years ago, the philosopher Phaedrus said, “Things are not always what they seem; the first appearance deceives many; the intelligence of a few perceives what has been carefully hidden.” He couldn’t have possibly imagined today’s world, yet his warning encapsulates deepfakes, one of the greatest threats of modern times. As AI advances, digital disinformation is blurring the lines between fact and fiction.

Russia's APT29 Launches Major Spear Phishing Campaign

Trend Micro warns that the Russian state-sponsored threat actor Earth Koshchei (also known as “APT29” or “Cozy Bear”) is using spear phishing emails to trick victims into connecting to rogue Remote Desktop Protocol (RDP) relays. “Earth Koshchei’s rogue RDP campaign reached its peak on October 22, when spear-phishing emails were sent to governments and armed forces, think tanks, academic researchers, and Ukrainian targets,” Trend Micro explains.

Teach Yourself Kubiscan in 7 Minutes (or Less...)

While Kubernetes’ Role-based access control (RBAC) authorization model is an essential part of securing Kubernetes, managing it has proven to be a significant challenge — especially when dealing with numerous users and pods. Fortunately, KubiScan is here to help address this issue.