Achieving Cyber Resilience With a Proper Training Program
March 01, 2022 | Matt Hmoud
A critical part of improving a business’ cyber resilience is ensuring staff, ...
Why client-side web application security is critical to protecting from Magecart and other similar attacks
March 01, 2022 | Mike Klepper
What can’t you buy on the internet? Last-minute birthday gifts. Check. A new ...
DevSecOps code process
February 28, 2022 | Keith Thomas
Best practices In the first article in this series we covered the basics. In ...
CISO Bytes Podcast: Russia-Ukraine Crisis, Combatting Nation-State Threats for Critical Infrastructure and Beyond
February 25, 2022 | Admin
In this episode of the Trustwave CISO Bytes Podcast, host David Bishop, Chief ...
Protecting patients by securing medical devices and the Internet of Medical Things (IoMT)
February 24, 2022 | Jill Rabach
This blog was written by an independent guest blogger.
Protecting patients by securing medical devices and the Internet of Medical Things (IoMT)
February 24, 2022 | Jill Rabach
This blog was written by an independent guest blogger.
Nation-State Actors or Common Cybercriminal, Your Cyber Fundamentals May Be Your Achilles’ Heel
February 23, 2022 | Eric Pinkerton
I have seen quite a few articles of late proclaiming that a major cyberattack ...
LevelBlue announces 2022 ‘Partner of the Year Awards’ winners
February 22, 2022 | Jordan Redd
We are thrilled to announce that Softcat is the LevelBlue 2022 Global Partner ...
Creating Buy-In for a Cybersecurity Awareness Program
February 17, 2022 | Amelia Gowa
There is more to implementing a successful cybersecurity training program than ...
What you need to know about Log4Shell
February 17, 2022 | Emily Davignon
Photo by ThisIsEngineering from Pexels
Be Prepared: Tax Scam Season is in Full Swing
February 16, 2022 | Admin
It's somehow fitting that Groundhog Day and tax scam season overlap.
Three things you should know about SASE and SD-WAN
February 16, 2022 | Will Eborall
How do SASE and SD-WAN compare? As organizations have accelerated their plans ...
How to secure microservices in a Zero-Trust environment
February 15, 2022 | Nahla Davies
This blog was written by an independent guest blogger.
XDR: Native vs. Open explained
February 14, 2022 | Belinda Streak
With the advent of extended detection and response (XDR), the security ...
Red, Purple, and Blue: The Colors of a Successful Cybersecurity Testing Program
February 10, 2022 | John Cartrett
This is the first in a series of blogs that will describe the importance of ...
6 Cybersecurity challenges facing digital banking
February 10, 2022 | Devin Partida
This blog was written by an independent guest blogger.
What are BEC scams and how to avoid them
February 09, 2022 | David Balaban
This blog was written by an independent guest blogger.
Unraveling the climate change and Cybersecurity connection
February 08, 2022 | Bernard Brode
This blog was written by an independent guest blogger.
Webinar - The Age of MSSPs: Uncovering the Why’s of Managed Services
February 07, 2022 | Admin
With security risks continuously mounting and the threat landscape evolving at ...
Information systems and cybersecurity: Connections in UX and beyond
February 07, 2022 | Devin Morrissey
Image source: Pexels
Data Assessment in Healthcare: Knowing What Data You Have Is Half the Battle
February 04, 2022 | Don White
When it comes to protecting personal healthcare information or a medical ...
Using KPIs to generate results in Cybersecurity
February 03, 2022 | Shannon Brewster
Gaining investment from business leaders to create a mature cybersecurity ...
The ultimate guide to Cyber risk management
February 02, 2022 | Irfan Shakeel
This blog was written by an independent guest blogger.
Mitigating Third-Party Vendor Risk in Your Supply Chain
February 01, 2022 | Jessica Charter
A recent survey by the analyst firm Gartner, showed that 89% of companies ...
Quantum computing brings new security risks: How to protect yourself
February 01, 2022 | Theodoros Karasavvas
This blog was written by an independent guest blogger.
6 Tips for Supply Chain Risk Management in 2022
January 31, 2022 | Henry Ward
Forrester recently predicted that in 2022, 60% of security incidents would ...
Stories from the SOC - WannaCry malware
January 31, 2022 | Ian Schlesinger
Stories from the SOC is a blog series that describes recent real-world security ...
How Data Privacy Has Evolved in the Age of the Breach
January 28, 2022 | Luke Kenny
As Data Privacy Day once again rolls around, we can look back at some healthy ...