Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Trustwave Earns Dual Honors in ISG's 2024 Provider Lens Quadrant Reports

Trustwave was awarded a pair of honors from the industry analyst firm ISG, being named a Leader in the US for Managed Security Services – SOC (Midmarket) and as a Rising Star in the UK for Managed Security Services – SOC (Midmarket) in ISG’s 2024 Provider Lens Quadrant Reports for these regions. This is the second consecutive year Trustwave was named a Leader in MSS for the US (Midmarket).

TCO Tanium Certified Operator - Certification Series - Tanium Tech Talks #99

Welcome to this installment of the Tanium certification series. Today we're looking at the entry level Tanium Certified Operator exam, the TCO. As with other exams in this series, I've invited one of the experts who helped write the exam questions to give us an insider's look at what is covered and to help you prepare.

How to Track User Activity with Ekran System [Hands-on Guide]

You may trust the people you work and partner with, but you never know how they really behave and handle your sensitive data within your organization’s network. Each user in your IT infrastructure brings their own security risks. Tracking user activity helps mitigate those risks and enhance your organization’s security. This article will show you how to set up an efficient user activity monitoring (UAM) process with Ekran System.

7 Reasons Why You Need a Cybersecurity Platform

At a high level, security leaders need tools that: a) Efficiently detect and respond to threats. b) Can be managed sustainably. c) Deploy quickly and scale with their organisation. d) Are cost-effective. Large SOCs in a handful of enterprises could do this by deploying point solutions and hiring experts to manage them. For everyone else, is there a more efficient way to deliver on these capabilities than a consolidated cybersecurity platform? If you’ve found one, stop reading now.

Q2 2024 Threat Landscape Report: Threat Actors Do Their Homework, Ransomware and Cloud Risks Accelerate

The education sector proved to be a key target for threat actors in Q2 2024, particularly for ransomware groups. FOG ransomware was a significant threat to the sector this quarter, with clear seasonal cycles in incidents impacting educational institutions, possibly due to perceived reduction in IT staffing around the summer months or the belief that schools may be more likely to pay a ransom during peak periods.

Five Key Findings from the Inaugural EPSS Report

Last month, Cyentia and First.org published the inaugural Exploit Prediction Scoring System (EPSS) performance report. The report goes beyond just assessing the EPSS predictive scoring model. It looks at historical vulnerability data and published CVEs, as well as provides comparisons to the other popular scoring models: CVSS and CISA-KEV.

API Security Best Practice by GigaOm #apisecurity #apiattacks #apimonitoring #cybersecurity

In this video, we highlight the most critical criteria for effective API security, helping you understand what to prioritize in your security strategy. Learn how to evaluate and implement key API security measures to protect your organization from growing cyber threats.

Navigating SIEM Consolidation: Three Must-Ask Questions

Webinar presented by Devo and DeepSeas The market for Security Information and Event Management (SIEM) is in transition. Many top-tier SIEMs are now outdated, facing end-of-life scenarios, and unable to cope with today’s data needs. Market consolidation poses significant risks and challenges for security operations centers, including impacts on stability, pricing, and threat detection capabilities.