Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Six ways privilege management improves your security posture

Identities, computers and groups all need access to resources. But only enough to fulfill a role, and only for as long as they need it. AD Admins, IT leaders, VPs and CISOs recognize this as a foundational part of Zero Trust least privilege models – and as one of the biggest challenges for enterprises. That’s because using native tools for privilege management is complex.

Upcoming Trustwave SpiderLabs Report Investigates Threats Against the Energy and Utilities Sector

Trustwave SpiderLabs is continuing its multi-year research effort delving into the unique cybersecurity challenges that face different vertical sectors with a new report launching on January 22. This effort analyzes the energy and utilities sector, industries which are increasingly targeted due to their critical role in supporting national and global infrastructures. Ransomware takes center stage in these reports, with Trustwave SpiderLabs reporting an 80% year-over-year surge in such attacks.

Acronis: The leader in EDR detection on Windows

In September 2024, SE Labs tested Acronis Extended Detection and Response (XDR) against targeted attacks based on APT29 and Scattered Spider. The test was done in parallel with SE Labs’ Q3 2024 comparative EDR test. Both tests were done using the same methodology and targeted attacks from APT29 and Scattered Spider, but the comparative test added DPRK (Democratic People’s Republic of Korea) ransomware to the evaluation.

How to Identify, Prevent, and Respond to MFA Phishing Threats

In an era where password breaches have become all too common, Multi-Factor Authentication (MFA) has emerged as a critical layer of security. MFA provides an authentication method that requires users to present multiple forms of identification before gaining access to systems, which is considered a more robust defence against cyber attacks. However, as cyber criminals evolve tactics, MFA is no longer impervious to threats, particularly phishing attacks that exploit vulnerabilities.

Mastering Credential Management: Top Tips & Best Practices

Credential management means securely managing user credentials to control access to important systems and data. With growing cyber threats, it has become essential for protecting sensitive information and meeting compliance standards. In this article, we’ll explore what credential management is, why it matters, and the best practices and tools to enhance your security.