M&A Trending In Cybersecurity Industry Vertical For 2022

January 28, 2022 | Chuck Brooks

This blog was written by an independent guest blogger.

DevSecOps plan process

January 27, 2022 | Keith Thomas

In the DevOps and DevSecOps Introduction, What is DevOps, we reviewed how our ...

Stories from the SOC - Inactive Account Exploitation

January 24, 2022 | Alex Galindo

Stories from the SOC is a blog series that describes recent real-world security ...

NFTs - Protecting the investment

January 20, 2022 | Karoline Gore

This blog was written by an independent guest blogger.

Log4j: How a Single Vulnerability Can Affect Multiple Systems

January 19, 2022 | Rob Horne

There are truisms that span history. One truism is that a single mistake can ...

Exploring influences on SSC grades for insurance companies

January 19, 2022 | Nahla Davies

This blog was written by an independent guest blogger.

When It comes to Cybersecurity - An ounce of prevention

January 18, 2022 | Tim Hazzard

Benjamin Franklin advised fire-threatened Philadelphians in 1736 that, “An ...

Russia’s FSB Takes Down REvil Cyber Gang in an Unprecedented Series of Raids

January 14, 2022 | Ziv Mador

Reuters reported on Friday that the Russian Federal Security Service (FSB) and ...

How to Outplay the Ransomware Playbook

January 13, 2022 | Darren Van Booven

Organizations across industries are increasingly concerned about their ...

Is Fighting Cybercrime a Losing Battle for Today's CISO?

January 12, 2022 | Theresa Lanowitz

At times, the quest to stay on top of web application security can seem futile. ...

FIN7 Sends BadUSB Devices to U.S. Businesses as Part of Targeted Ransomware Campaign

January 11, 2022 | Karl Sigler

First reported by The Record, the FBI has issued a new security Flash Alert ...

Introducing next-generation firewall from Palo Alto Networks to support 5G-enabled IoT, OT and IT use cases

January 11, 2022 | Lisa Ashjian

Enterprises know they need defenses integrated into each aspect of their ...

Multi-Factor is incomplete without backup codes

January 10, 2022 | Bob Covello

This blog was written by an independent guest blogger.

CISO's Corner: The Four Best Cybersecurity Investments You Can Make During the Cyber Talent Shortage

January 06, 2022 | David Bishop

The need for strong cybersecurity has reached critical mass. Seventy-six ...

Endangered data in online transactions and how to safeguard company information

January 06, 2022 | Samantha Clark

This blog was written by an independent guest blogger.

LevelBlue teams up with Cisco to create new managed SASE offering

January 05, 2022 | Will Eborall

Whether organizations call it digital transformation or just using technology ...

Breaking Out of the Vicious Cycle of Ransomware Attacks

January 04, 2022 | Ed Williams

Ransomware has quickly become one of the most prevalent cyber threats facing ...

Technology's contributions toward safety in healthcare

January 04, 2022 | Devin Morrissey

This blog was written by an independent guest blogger.

Manual and semi-automated testing for Insecure Direct Object References (IDORs) using Burp Suite

December 29, 2021 | Irfan Shakeel

This blog was written by an independent guest blogger.

A Year of Threat Intel: Looking Back at SpiderLabs Research in 2021

December 28, 2021 | Admin

2021 will go down in the record book as another critical year in the ...

Top 10 LevelBlue Blogs Published in 2021

December 22, 2021 | Kate Brew

I enjoy being editor and managing this blog so much, I thought I'd share some ...

How to evolve your organization into a data-centric security architecture

December 21, 2021 | Theodoros Karasavvas

This blog was written by an independent guest blogger.

Has the pandemic increased the burnout rate in the Cybersecurity profession?

December 17, 2021 | Bob Covello

This blog was written by an independent guest blogger.

Preparedness, Speed and Communication are the Cornerstones of a Solid Ransomware Defense

December 16, 2021 | Darren Van Booven

Ransomware attackers today have the technical skill and tools to analyze a ...

5 Endpoint security tips for the holidays

December 15, 2021 | Lisa Ashjian

The holiday season is a hectic time for businesses but this year has brought ...

Cybersecurity in the Year Ahead: Trustwave 2022 Cybersecurity Predictions – APAC Edition

December 14, 2021 | Admin

This is part 3 of Trustwave’s 2022 Cybersecurity Predictions blog series ...

The Cybersecurity Playbook You Need to Run To Mitigate Risk During M&A

December 09, 2021 | Luke Kenny

Mergers and acquisitions are high-risk endeavors, sometimes with billions of ...

Trustwave Gains CREST Vulnerability Assessment Accreditation

December 07, 2021 | Admin

Trustwave has been accredited by the internationally-recognized professional ...