Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Trustwave

Below you will find reports with the source of “Trustwave”

image from 2020 Trustwave Global Security Report

2020 Trustwave Global Security Report

The 2020 Trustwave Global Security Report is an annual review of the phenomena, trends and statistics affecting computer security and worldwide safety, as observed by Trustwave systems and security analysts throughout 2019. As we enter a new deacade, we take a fresh look at the changing face of the compromise, from the ways in which increasingly sophisticated threat actors adapted in recent years to improvements in threat detection and response and how people in white hats responded.

(more available)
Added: May 8, 2020
image from The Underground Economy

The Underground Economy

This report compiles information gained by the Trustwave SpiderLabs who maintain a presence in some of the more prominent recess of the online criminal underground. The provide information on the dark web’s code of honor, reputation systems, job market, and techniques used by cybercriminals to hide their tracks from law enforcement.

(more available)
Added: September 18, 2019
image from 2019 Trustwave Global Security Report

2019 Trustwave Global Security Report

This report promises to allow you to use the vast insights and hard data contained in the report to help bolster your security posture and better understand the nature of the threats we face today.

(more available)
Added: May 18, 2019
image from 2016 Security Pressures Report

2016 Security Pressures Report

A survey of 1,600 IT professionals on the risks being faced by organizations, the common reactions to those concerns, and the challenges with which individuals are struggling.

(more available)
Added: October 26, 2018
image from 2015 Trustwave Global Security Report

2015 Trustwave Global Security Report

The writers of this report invite you to use the knowledge contained in this report to become your own master battlefield tactician, by getting to know your enemies in the cyber universe.

(more available)
Added: October 25, 2018
image from 2014 Trustwave Global Security Report

2014 Trustwave Global Security Report

Subtitled “Cyber Attacks: Can the Market Respond?”

Added: October 24, 2018
image from Winning The War On Ransomware

Winning The War On Ransomware

This is an infographic that can help your organization understand and win the war on Ransomware.

Added: October 23, 2018
image from Three Pillars For Successfully Addressing the GDPR

Three Pillars For Successfully Addressing the GDPR

This white paper offers you a strategic framework that can help your organization manage the complexity of GDPR and build an ongoing compliance program.

(more available)
Added: October 22, 2018
image from The Value Of Data

The Value Of Data

This paper was conceived to examine the relative value placed on data from the perspective of different stakeholders: be they enterprise security professionals, regulators, insurers or cybercriminals. An integral part of this process is determining what that data is worth. The report attempts to answer this question and to provide guidance that can be used to help evaluate the cost of data breaches. It also looks at what data risk vigilance measures organizations have in place.

(more available)
Added: October 21, 2018
image from The Pressured World Of A Security Pro

The Pressured World Of A Security Pro

This is an infographic summary based on the 2017 Security Pressures report.

Added: October 20, 2018
image from Post-Soviet Bank Heists

Post-Soviet Bank Heists

This report takes a look at recent bank heists that originated from Post-Soviet states.

Added: October 19, 2018
image from 2018 Security Pressures Report

2018 Security Pressures Report

Based on a survey of 1,600 information security decision-makers and influencers in six countries, the 2018 Security Pressures Report delves into keeping businesses safeguarded against cyber threats, attacks and compromises.

(more available)
Added: October 18, 2018
image from Internet Of Things Cybersecurity Readiness

Internet Of Things Cybersecurity Readiness

This report provides the results of a unique survey designed to analyze their IoT technologies and the struggles and challenges of providing and preparing for security issues related to thos devices.

(more available)
Added: October 17, 2018
image from The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator’s Guide to Preparing for the GDPR, is an extensive guide to help you understand key requirements of the regulation and the approach you should take to address your organization’s compliance.

(more available)
Added: October 17, 2018
image from 2018 Global Security Report

2018 Global Security Report

This annual report takes a look at the last decade of cyber security issues, including 2017, and provides some insight into the years ahead.

(more available)
Added: October 16, 2018
image from 2017 Global Security Report

2017 Global Security Report

This annual report takes a look at the security events of 2017 and projects what is to come in 2018.

(more available)
Added: October 15, 2018
image from Best Practices For Web Application Firewall Management

Best Practices For Web Application Firewall Management

The experts at TrustWave have prepared this report to outline the issues and practices for web application firewall management.

Added: October 14, 2018
image from 2017 Security Pressures Report

2017 Security Pressures Report

For ease of consumption, this report is designed into individual sections of “pressures” each featuring insightful context and convenient data tables, with the results compared against last year’s findings as a way of understanding the state of security. In addition, we have broken out the results by country to include the United States, United Kingdom, Canada, Australia, Singapore – and for the first time – Japan. Like in years past, you will find some of the comparison data is particularly intriguing and revealing into the mindset of IT and security professionals based on their region.

(more available)
Added: October 13, 2018
image from 2016 Trustwave Global Security Report

2016 Trustwave Global Security Report

This report summarizes the goals and activities of the initiative, the history and status of the initiative and key cyber value-at-risk concept foundations.

(more available)
Added: October 12, 2018
© Cyentia Institute 2025
Library updated: July 9, 2025 00:09 UTC (build b1d7be4)