Chicago, IL, USA
Mar 22, 2023   |  By Trustwave
The United States Patent and Trademark Office (USPTO) is the repository for a wealth of knowledge dating back to the nation's founding. The information behind many of the world's greatest inventions ranging from the light bulb, iPhone, Maglev trains to the zipper are housed and protected by the USPTO. A task that is now considerably more difficult as the primary storage medium moves from paper to on-premises and into the cloud.
Mar 21, 2023   |  By Trustwave
Trustwave’s MailMarshal received a major update this month with the addition of PageML to the Blended Threat Module. The BTM enables the email security solution to conduct in-depth, real-time scans when a URL in an email is clicked to determine if the URL is malicious. PageML boosts the BTM’s ability to detect malicious URLs by one-third by applying machine learning techniques to page content in real time. The new scanning feature is named PageML, short for Page Machine Learning.
Mar 20, 2023   |  By Trustwave
The well-respected industry analyst firm Gartner named Trustwave as a Representative Vendor in its just released 2023 Market Guide for Managed Detection and Response Services.
Mar 16, 2023   |  By Trustwave
Ensuring employees operate securely regardless of location has grown in importance over the last several years as the number of people working remotely has exploded. These workers are most likely operating within a software-defined wide area network (SD-WAN). They use SD-WAN to work with data that is now processed more and more in many different cloud services.
Mar 15, 2023   |  By Trustwave
Trustwave and Trellix have entered a strategic partnership that will see the two premier cybersecurity companies deliver best-in-class Managed Detection and Response (MDR) solutions to enterprise-class organizations. The partnership will begin with Trustwave's innovative MDR services on Trellix EDR products, which will result in these clients receiving unrivaled threat visibility and the ability to detect and respond to threats faster and more precisely.
Mar 9, 2023   |  By Trustwave
Trustwave SpiderLabs “noted” in Part 1 and Part 2 of our OneNote research that OneNote has been used as a malware delivery mechanism now we will shift gears and focus on several OneNote decoy notes SpiderLabs has discovered that deliver malware families like Qakbot, XWorm, Icedid, and AsyncRAT. While the malware payload can change, the techniques have generally been the same.
Mar 8, 2023   |  By Trustwave
In part one, we examined how threat actors abuse a OneNote document to install an infostealer. Part 2 of this series discusses an AsyncRAT infection chain while detailing important parts of the code. We’ll also quickly analyze other notable malware strains such as Qakbot and RemcosRAT.
Mar 8, 2023   |  By Trustwave
Threat actors are taking advantage of Microsoft OneNote's ability to embed files and use social engineering techniques, such as phishing emails and lures inside the OneNote document, to get unsuspecting users to download and open malicious files. Once clicked, an attacker can use the embedded code for various malicious purposes, such as stealing data or installing ransomware on victims' systems.
Mar 7, 2023   |  By Trustwave
Australia is renowned for our willingness to adopt IT efficiencies! The ongoing shift to cloud computing both worldwide and here, seen recently in Amazon’s expansion to a second data center in Melbourne, shows that Australians are not afraid of outsourcing workloads to shared data center.
Mar 2, 2023   |  By Trustwave
President Joe Biden took the next step in the nation's ongoing effort to combat cyber threats by issuing the National Cybersecurity Strategy on March 2, which focuses on growing the public-private sector security partnership needed to protect critical infrastructure, dismantle threat groups, and increase resiliency.
Nov 11, 2022   |  By Trustwave
Don’t let complexity and cyber threats get in the way of moving your business forward. Trustwave Managed Detection and Response (MDR) is an industry-leading rapid threat detection and response service. We monitor, investigate, and respond to active threats to your business 24x7. Augment your team today with cyber experts for superior protection against the most sophisticated threats.
Jun 6, 2022   |  By Trustwave
Scale your organization’s cyber defense program by harnessing the power of industry-leading Trustwave Managed Detection and Response services by leveraging industry-leading Microsoft Sentinel. In this brief video overview, we cover: View the video for further insight into the partnership of Trustwave and Microsoft.
Jun 6, 2022   |  By Trustwave
Trustwave Managed Detection and Response services integrate with Microsoft Defender for Endpoint to take containment, eradication, and recovery actions directly on the endpoint, delivering a streamlined experience for the end users. For further information on how to truly integrate your cyber defense team with industry-leading services and technologies, watch our overview of how Trustwave partners with Microsoft.
Jan 15, 2021   |  By Trustwave
As organizations turn away from legacy branch routers in favor of secure SD-WAN solutions, Trustwave has the security solutions to help.
Oct 30, 2020   |  By Trustwave
In today’s threat environment, the reality is that most organizations will inevitably experience a breach. At Trustwave, our job is detecting, containing and eradicating those threats with Managed Threat Detection and Response (MTDR) services. Find out how we provide you with the security outcomes you need, so that you can stay focused on doing what you do best… keeping your organization running.
Jul 29, 2020   |  By Trustwave
For organizations that might be new to the world of managed security services (MSS), what is the process of getting started like? What are the main benefits that a client should expect to realize? And how does managed threat detection and response (MTDR) fit into the mix? To find out, we interviewed Rachelle Felix-Blackmon, Director of Global MSS Business Operations at Trustwave.
Jul 24, 2020   |  By Trustwave
How concerned should organizations be about the danger from nation state actors? To find out, we interviewed Brian Hussey, VP of Cyber Threat Detection & Response at Trustwave. Topics we covered included what he sees in the field when it comes to nation-state capabilities, whether or not they truly are better organized than cyber gangs, and how organizations can help protect themselves.
Jul 15, 2020   |  By Trustwave
We interviewed Liz Limjuco, SVP of U.S. Cyber Brokerage at Marsh, to talk about what risk trends she is seeing in cybersecurity, what organizations are doing to adapt to those trends, how organizations can better understand their risks, and what they can do to help mitigate those risks.
Jul 1, 2020   |  By Trustwave
Questions about the GoldenSpy malware? Find answers in this video interview with Brian Hussey, VP of Cyber Threat Detection and Response for Trustwave SpiderLabs. Includes recommendations for how organizations can best protect themselves.
Jul 1, 2020   |  By Trustwave
Trustwave SpiderLabs has discovered a new malware family, dubbed GoldenSpy, embedded in tax payment software that a Chinese bank requires corporations to install to conduct business operations in China. Learn more in this video.
Jan 16, 2022   |  By Trustwave
It is no secret that many organizations can do better with their security programs. Zero Trust allows for an evolution of an organization's strategy. It also forces organizations to rethink their approach to securing data to meet the requirements of data privacy regulations and expectations from their customers and business partners. Risk-minded organizations take the Zero Trust mindset and adopt it as best they can to fit their current and future state infrastructure.
Jan 16, 2022   |  By Trustwave
In today's hyper-connected world, cyberattack risks have never been more pronounced. Threat actors continue to develop malicious, ingenious tricks and techniques to stay one step ahead of security systems and response specialists. As a result, a more focused and proactive approach to detecting, investigating, and responding to threats is required. In this guide, we break down the comparison between Managed Detection and Response (MDR) and Managed Security Services (MSS) and how to determine what to look for in providers.
Dec 1, 2021   |  By Trustwave
Relational databases and big data stores are a prime target for attackers due to the amount of sensitive information residing within, such as customer information, intellectual property and proprietary secrets. For more than 20 years, the database security experts at Trustwave have helped organizations design, implement and maintain database security programs to meet their specific business, security and compliance objectives.
Dec 1, 2021   |  By Trustwave
Cybercrime continues to rise, and Financial Services organizations are often a prime target due to their valuable data. While no strangers to maintaining strong security strategies, it can be exhausting staying one step ahead of the threats.
Nov 1, 2021   |  By Trustwave
Government agencies are faced with the complexity of what needs to be done to meet the Executive Order 14028 requirements. This whitepaper provides guidance on how to comply with the Executive Order and how it applies to securing critical databases.
Nov 1, 2021   |  By Trustwave
Wondering what the underground world of cybercrime looks like following after a year of unprecedented events? Bad actors capitalize on these events - from political unrest and economic instability to changing workforce dynamics and ongoing public health concerns - putting organizations of all sizes and across all industries at increased risk. Learning more about these new and innovative exploits, which take advantage of unprecedented global circumstances, allows you to make more informed decisions regarding your security posture.
Oct 1, 2021   |  By Trustwave
If your organization is using or plans to move to Microsoft 365, learn what to expect from an email security, data protection and management perspective. Read our latest whitepaper In, Out and Around: 360° Security for Microsoft 365 for insights into protecting Microsoft 365 email in these key areas.
Oct 1, 2021   |  By Trustwave
The ever-shifting threat landscape coupled with the increased risk and loss of confidential information through previous breaches, defending protected controlled unclassified information within the DIB supply chain is increasingly difficult. The Department of Defense (DoD) determined that its supply chain faced an unacceptable amount of risk, resulting in the transition from self-certification to the creation of the CMMC (Cybersecurity Maturity Model Certification), which requires third-party assessments and certification of compliance.

Trustwave is recognized as a global security leader in managed security services (MSS) and managed detection and response (MDR).  With more than 2,000 world-class security professionals operating on behalf of clients across 96 countries, Trustwave helps organizations across the globe detect and respond to threats 24x7 in the hybrid multi-cloud world. 

The elite Trustwave SpiderLabs team provides award-winning threat research and intelligence, which is infused into Trustwave services and products to fortify cyber resilience in the age of advanced threats.

Recognized as a Leader in Stopping Threats:

  • Detection and Response: Helping clients design and advance their cyberthreat operations , adding 24x7 monitoring capacity, threat hunting and rapid response.
  • Threat Protection: Services and solutions to help organizations protect data, assets and users.
  • Continuous Testing: Helping clients reduce risks in their ever-evolving attack surface to better discover, manage and remediate vulnerabilities.

Cyber resilience for the hybrid, multi-cloud world.