Achieving Cyber Resilience With a Proper Training Program

March 01, 2022 | Matt Hmoud

A critical part of improving a business’ cyber resilience is ensuring staff, ...

Why client-side web application security is critical to protecting from Magecart and other similar attacks

March 01, 2022 | Mike Klepper

What can’t you buy on the internet? Last-minute birthday gifts. Check. A new ...

DevSecOps code process

February 28, 2022 | Keith Thomas

Best practices In the first article in this series we covered the basics. In ...

CISO Bytes Podcast: Russia-Ukraine Crisis, Combatting Nation-State Threats for Critical Infrastructure and Beyond

February 25, 2022 | Admin

In this episode of the Trustwave CISO Bytes Podcast, host David Bishop, Chief ...

Protecting patients by securing medical devices and the Internet of Medical Things (IoMT)

February 24, 2022 | Jill Rabach

This blog was written by an independent guest blogger.

Protecting patients by securing medical devices and the Internet of Medical Things (IoMT)

February 24, 2022 | Jill Rabach

This blog was written by an independent guest blogger.

Nation-State Actors or Common Cybercriminal, Your Cyber Fundamentals May Be Your Achilles’ Heel

February 23, 2022 | Eric Pinkerton

I have seen quite a few articles of late proclaiming that a major cyberattack ...

LevelBlue announces 2022 ‘Partner of the Year Awards’ winners

February 22, 2022 | Jordan Redd

We are thrilled to announce that Softcat is the LevelBlue 2022 Global Partner ...

Creating Buy-In for a Cybersecurity Awareness Program

February 17, 2022 | Amelia Gowa

There is more to implementing a successful cybersecurity training program than ...

What you need to know about Log4Shell

February 17, 2022 | Emily Davignon

Photo by ThisIsEngineering from Pexels

Be Prepared: Tax Scam Season is in Full Swing

February 16, 2022 | Admin

It's somehow fitting that Groundhog Day and tax scam season overlap.

Three things you should know about SASE and SD-WAN

February 16, 2022 | Will Eborall

How do SASE and SD-WAN compare? As organizations have accelerated their plans ...

How to secure microservices in a Zero-Trust environment

February 15, 2022 | Nahla Davies

This blog was written by an independent guest blogger.

XDR: Native vs. Open explained

February 14, 2022 | Belinda Streak

With the advent of extended detection and response (XDR), the security ...

Red, Purple, and Blue: The Colors of a Successful Cybersecurity Testing Program

February 10, 2022 | John Cartrett

This is the first in a series of blogs that will describe the importance of ...

6 Cybersecurity challenges facing digital banking

February 10, 2022 | Devin Partida

This blog was written by an independent guest blogger.

What are BEC scams and how to avoid them

February 09, 2022 | David Balaban

This blog was written by an independent guest blogger.

Unraveling the climate change and Cybersecurity connection

February 08, 2022 | Bernard Brode

This blog was written by an independent guest blogger.

Webinar - The Age of MSSPs: Uncovering the Why’s of Managed Services

February 07, 2022 | Admin

With security risks continuously mounting and the threat landscape evolving at ...

Information systems and cybersecurity: Connections in UX and beyond

February 07, 2022 | Devin Morrissey

Image source: Pexels

Data Assessment in Healthcare: Knowing What Data You Have Is Half the Battle

February 04, 2022 | Don White

When it comes to protecting personal healthcare information or a medical ...

Using KPIs to generate results in Cybersecurity

February 03, 2022 | Shannon Brewster

Gaining investment from business leaders to create a mature cybersecurity ...

The ultimate guide to Cyber risk management

February 02, 2022 | Irfan Shakeel

This blog was written by an independent guest blogger.

Mitigating Third-Party Vendor Risk in Your Supply Chain

February 01, 2022 | Jessica Charter

A recent survey by the analyst firm Gartner, showed that 89% of companies ...

Quantum computing brings new security risks: How to protect yourself

February 01, 2022 | Theodoros Karasavvas

This blog was written by an independent guest blogger.

6 Tips for Supply Chain Risk Management in 2022

January 31, 2022 | Henry Ward

Forrester recently predicted that in 2022, 60% of security incidents would ...

Stories from the SOC - WannaCry malware

January 31, 2022 | Ian Schlesinger

Stories from the SOC is a blog series that describes recent real-world security ...

How Data Privacy Has Evolved in the Age of the Breach

January 28, 2022 | Luke Kenny

As Data Privacy Day once again rolls around, we can look back at some healthy ...