Trustwave news stories

Email
The network effect and the search for resilient email security
Not only is email everywhere, but it is ‘built-in’ to our lives as a required mode of communication for too many activities to name.

Trends
Trustwave report highlights biggest cybersecurity trends of today
The 2020 Trustwave Global Security Report highlights key trends around cyber criminals activity and success rate, looking at specific technology, methods, industries and scams.

Cloud
Trustwave introduces dashboard to manage security testing
Through point-and-click navigation, users can scan business-critical applications to search for unpatched vulnerabilities, exploitable code or evidence of malicious activity.

Cloud Security
Trustwave platform brings more visibility and control cloud security
The platform aims to give internal security teams deep visibility, technologies and the security expertise necessary for protecting assets and eradicating threats as they arise.

Cloud Security
Trustwave brings database security scanning to the cloud
Trustwave DbProtect allows customers to protect big data stores across (and in between) major cloud services.

Cybersecurity
Cyber threats progressing as defenses evolve - Trustwave
The findings illustrate cybercriminals deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills.

Palo Alto Networks
Trustwave expands MSS alliance with Palo Alto Networks
Trustwave expands its existing role as a trusted advisor and is now a single point of contact for the Palo Alto Networks portfolio of security products.

Trustwave
Singtel integrates cybersecurity capabilities under Trustwave banner
The integration enables Trustwave to harness the synergies of Singtel’s global cybersecurity business, revenue, capabilities across the Americas, Europe and Asia Pacific.

Cloud
Ransomware infection? Here’s how you control the damage
Ransomware has evolved to be more sophisticated and targeted, and remains a threat to businesses of all sizes.

Ransomware
Ransomware: What to do if your business is hit
Ransomware has evolved to be more sophisticated, crafty and targeted and remains a threat to businesses of all sizes.

Social Media
Trustwave releases facial recognition tool for pentesters
Social Mapper takes an automated approach to searching popular social media sites for names and pictures of individuals.

Cloud
IDC names Trustwave ‘leader’ in APAC MSSP report
Trustwave has moved into the leader position from the major player category in the previous year.

Trustwave
Finding the right MSSP for your business: A buyer's guide
Security. It’s the supporting backbone of every business but it can often feel like an uphill struggle for internal security teams.

Cybersecurity
Why you need to go beyond SIEM to stay secure
Advanced threats are bypassing traditional security measures and are compromising the integrity of IT environments at an alarming rate.

Cybersecurity
Report: Cybersecurity pressures on the rise - but there is a solution
Trustwave's annual survey found that for the fifth consecutive year security professionals are feeling more stress, but there are some bright spots.

GDPR
It’s G-Day: GDPR now operational so what do the experts think?
GDPR is now officially live and the hype is reaching manic levels with the term beating 'Beyoncé' on Google this week - here's what the experts think.

Cybercrime
New report delves deep into cybercrime - and forecasts its future
Now in its tenth year, Trustwave has released its encyclopaedic report that details both current and future threats that are crucial to be aware of.

Trustwave
Gartner positions Trustwave as a new “Leader” in MQ for managed security services
Trustwave was previously positioned as a Challenger in the 2017 version of the report, marking its first appearance in the report.

Email Security
Scammers disguise ASIC spam campaigns through genuine email marketing firm
Scammers abused an online email marketing company to send spam that appear to be from the Australian Securities and Investment Commission (ASIC).

Email Security
New email spam campaign ditches traditional Office macro infection tactic
A new wave of spam emails use Microsoft Office documents to download password stealers without having to activate Macros.

Netgear
Full list of NETGEAR router vulnerabilities revealed - is your device on the list?
Many NETGEAR routers were subject to vulnerabilities that allowed attackers to take control of the devices through a password recovery feature.

Check Point
Crypto-miners creating havoc for businesses: Coinhive 'Most Wanted' malware
Crypto-mining malware variants are causing headaches for enterprises and their computers as website owners try to recoup revenue, says Check Point.

Veeam
5 predictions for 2018 from channel insiders
ChannelLife has gathered information from several insiders and come up with five predictions for the A/NZ channel in 2018.

Cryptocurrency
Malicious cryptocurrency miners shift focus to Google Play
Cryptocurrency miners are spreading beyond computer operating systems and on to Android applications through Google Play.