Trustwave

Palo Alto Networks Cortex XMDR Specialization empowers customers’ security operations
Palo Alto Networks announced its Cortex eXtended Managed Detection and Response (XMDR) Partner Specialization to help customers detect, investigate and respond to cyberthreats …

Secure your databases against opportunistic attackers
If you connect databases / servers to the internet and secure them poorly, you can count on them getting compromised quickly. According to findings by Radoslaw Zdonczyk, …
Trustwave partners with CISA and joins CISCP to help strengthen U.S. cybersecurity resiliency
Trustwave Government Solutions announced it has joined the Cybersecurity and Infrastructure Security Agency (CISA) Cyber Information Sharing and Collaboration Program (CISCP). …
Trustwave expands senior leadership team with two new appointments
Trustwave announced the appointment of two new members to its senior leadership team. Spencer Ingram, senior vice president, operations, will drive strategy for customer …

VMware fixes critical vCenter Server RCE vulnerability, urges immediate action (CVE-2021-21985)
VMware has patched two vulnerabilities (CVE-2021-21985, CVE-2021-21986) affecting VMware vCenter Server and VMware Cloud Foundation and is urging administrators to implement …

How do I select a managed cybersecurity solution for my business?
Digital transformation has been around for a while, but last year it accelerated its pace significantly. As organizations suddenly shifted to an almost exclusively digital …

Office 365 phishing campaign uses publicly hosted JavaScript code
A new phishing campaign targeting Office 365 users cleverly tries to bypass email security protections by combining chunks of HTML code delivered via publicly hosted …

How do I select an attack detection solution for my business?
Around the world, organizations are facing a tremendous increase in cyber risk. A recent research reveals that 31% of companies now experience a cyberattack at least once a …

SolarWinds Orion exploited by another group of state-sponsored hackers
Another group of state-sponsored hackers has exploited the ubiquity of SolarWinds software to target US government agencies, Reuters reported on Tuesday. State-sponsored …

Addressing the lack of knowledge around pen testing
The vast majority of attackers are opportunist criminals looking for easy targets to maximize their profits. If defenses are sufficiently fortified, finding a way through will …

Security automation: Time for a new playbook
From increasingly sophisticated threats to the mad concoction of on-premise and cloud solutions that comprise most organizations’ IT infrastructure and the plethora of new IoT …

How tech trends and risks shape organizations’ data protection strategy
Trustwave released a report which depicts how technology trends, compromise risks and regulations are shaping how organizations’ data is stored and protected. Data protection …
Featured news
Resources
Don't miss
- Hackers launch data leak site to extort 39 victims, or Salesforce
- Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)
- How to succeed at cybersecurity job interviews
- Meet ARGUS, the robot built to catch hackers and physical intruders
- Proxmox Mail Gateway: Open-source email security solution reaches version 9.0