Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Cybersecurity in 2024: Reflecting on the Past, Preparing for the Future

As Europe is returning from summer breaks, it is time to reflect on the first half of 2024 and look forward to the rest of the year. Ransomware attacks on hospitals, blue screens across the world crippling airline operations and other industries, deepfakes to sway opinion and possibly elections, deepfake social engineering tactics to extort significant amounts of money - so far the year has kept cybersecurity professionals busy.

Trustwave Earns Dual Honors in ISG's 2024 Provider Lens Quadrant Reports

Trustwave was awarded a pair of honors from the industry analyst firm ISG, being named a Leader in the US for Managed Security Services – SOC (Midmarket) and as a Rising Star in the UK for Managed Security Services – SOC (Midmarket) in ISG’s 2024 Provider Lens Quadrant Reports for these regions. This is the second consecutive year Trustwave was named a Leader in MSS for the US (Midmarket).

Hybrid API Security: The Best of Both Worlds

In API security, organizations frequently encounter a tough decision: whether to opt for the flexibility and scalability of a SaaS solution or the data control and privacy of an on-premises deployment. Salt Security's hybrid deployment option provides a solution that combines the advantages of a SaaS solution with the assurance of data privacy, offering the best of both worlds for organizations.

Navigating SIEM Consolidation: Three Must-Ask Questions

Webinar presented by Devo and DeepSeas The market for Security Information and Event Management (SIEM) is in transition. Many top-tier SIEMs are now outdated, facing end-of-life scenarios, and unable to cope with today’s data needs. Market consolidation poses significant risks and challenges for security operations centers, including impacts on stability, pricing, and threat detection capabilities.

Contextual Security and Beyond: The Future of Cybersecurity

Welcome back to Razorwire! I'm Jim, your host, and joining me today are cybersecurity experts Richard Cassidy and Oliver Rochford. Following on from our last episode of Razorwire, where Oliver and I discussed the key issues that cyber professionals need to focus on in 2024, this episode centres on key takeaways from recent security conferences, particularly RSA and Infosecurity Europe, and explores the shift towards contextual security as highlighted in Byron Acohido's recent report.

API Security Best Practice by GigaOm #apisecurity #apiattacks #apimonitoring #cybersecurity

In this video, we highlight the most critical criteria for effective API security, helping you understand what to prioritize in your security strategy. Learn how to evaluate and implement key API security measures to protect your organization from growing cyber threats.

How Best to Configure Audit Detailed File Share

When enabled, the Windows security setting audit detailed file share keeps a detailed record of every time someone tries to access a shared file or folder on either the user’s computer or network. When a regular audit is configured, it logs only a singular event – which user or client is establishing a connection to which shared file or folder. A detailed audit records additional information about who is accessing the shared files and folders.