Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The New York State Law on Data Security Breach Notification for Business Owners

A data security breach occurs when an unauthorized party accesses or acquires computerized data without valid authorization from the right source. This act is against the stance of a business that guarantees integrity, confidentiality, and security of sensitive information such as social security number, name, account number, driver's license number, biometric information, and debit/credit card details. Some laws and regulations mandate business parastatals to notify the state and their customers whenever a data security breach occurs.

Internet Safety at Sea: How to Stay Secure While Cruising

Staying connected while on vacation has never been easier. Even when sailing the ocean waves on a cruise, technology allows us to stay up-to-date with our friends and family, sharing our adventures and staying in touch with loved ones on social media, by email, over messaging and chat applications, and by video.

Areas Where Smart Elderly Care Solutions Are Making an Impact

Smart elderly care solutions have revolutionized how we support and care for older adults in today's digital world. These technologies combine the power of computers, sensors, and the internet to make life easier and safer for seniors. From wearable devices that track health to smart home systems that help with daily tasks, these innovations are changing what it means to age. They allow older adults to stay independent longer, while giving their families peace of mind.

Understanding Security Log Analytics vs. SIEM for Midsized Companies Targeted by Cybercriminals

SecOps teams at midsize companies face a unique set of challenges when it comes to managing organizational cybersecurity. Midsize companies (those with 100-999 employees and $50 million-$1 billion in annual revenue, according to Gartner) possess significant financial resources and valuable data that may be targeted by digital adversaries.
Sponsored Post

Can the EventSentry Agents cause the same outage & disruption like the CrowdStrike Falcon sensor did?

The faulty Rapid Response Content CrowdStrike update that disabled millions of Windows machines across the globe on 7/19/2024 was any IT professional’s nightmare. Having to manually visit and restore each affected machine (further complicated by BitLocker) severely limited the recovery speed, especially for businesses with remote locations, TVs, kiosks, etc.

Geek Squad Scam 2024: What Is It and How to Prevent It

One of the recent email scams of the past few months is the Geek Squad scam. Similar to other phishing scams, this scam involves cybercriminals impersonating Geek Squad - a trusted tech support team from the American company Best Buy. As we learn more about the Geek Squad scam, including what it is and how to spot and prevent it, you will be able to protect yourself from it and learn techniques to defend yourself against present and future scams.

Trustwave Named as a Representative Vendor in the 2024 Gartner Market Guide for Digital Forensics and Incident Response Retainer Services

For the second week in a row, Trustwave proudly announces recognition from the industry analyst firm Gartner. Today, Trustwave is proud to reveal that Gartner has named us as a Representative Vendor in the 2024 Gartner Market Guide for Digital Forensics and Incident Response (DFIR) Retainer Services. This news follows Trustwave's announcement last week stating we were named a Representative Vendor in the 2024 Gartner Market Guide for Managed Detection and Response.

Weekly Cyber Security News 25/07/2024

Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! I’m sure some of you out are still dealing with the last week’s issue and never want to hear the word CrowdStrike again, well this might have helped.

Transforming enterprise data from leaky sieve to Fort Knox

Enterprises today face significant challenges in managing, governing, and securing corporate data. Data moves and is shared more ubiquitously than we likely recognize. Through the use of large language models (LLMs), shared with third-party vendors, or exposed on the dark web, there are blind spots that hinder the security and IT teams’ visibility into where data resides and how and by whom it’s accessed.