The Resilience Retainer: Incident Response Retainers, Reimagined
March 03, 2026
Stay Informed
Sign up to receive the latest security news and trends straight to your inbox from LevelBlue.
Identity & Beyond: 2026 Incident Response Predictions
January 14, 2026 | Jamie Mamroe
In 2026, incident response (IR) will continue its shift away from traditional ...
SpiderLabs Ransomware Tracker Update October 2025: Qilin Doubles Down on Attacks
November 04, 2025
The worldwide ransomware landscape saw a dramatic shift in attacks in October ...
Why DFIR: A Guide to Digital Forensics and Incident Response Services and Retainers
September 15, 2025
Digital Forensics and Incident Response (DFIR) services are a critical part of ...
Deep Dive: A DFIR Case Study in Hospitality
May 22, 2025
Phishing in Hospitality: Real-world case study reveals how QR codes and fake ...
Ransomware Response Plan: What Steps Schools and Libraries Should Take After an Attack
May 14, 2025 | Sarah Manley
In Part 1 of this blog series The Ransomware Threat: Preparing Schools and ...
From Fast to Smart: Rethinking Incident Response Metrics
April 23, 2025 | Bindu Sundaresan
In cybersecurity, speed has always been a big deal. How quickly can you detect ...
Reduce Your Risk: Improve Your Incident Readiness and Response Program to Drive Operational Efficiency
April 21, 2025 | Marina Johnson
Cyberattacks continue to evolve and increase in frequency, making it difficult ...
Cybersecurity Consulting and Ransomware Updates, February
March 05, 2025 | Bindu Sundaresan
Each month, we break down critical cybersecurity developments, equipping ...
How Agentic AI Is Transforming Enterprise Software Development and Cybersecurity
March 03, 2025 | Theodoros Karasavvas
Agentic AI represents the next step in artificial intelligence, moving beyond ...
Defending Healthcare: LevelBlue’s Dedication to Fight Cyber Threats to Patient Safety
August 15, 2024
Hospitals face a challenging dilemma: delivering the highest quality of medical ...
Trustwave Named as a Representative Vendor in the 2024 Gartner® Market Guide for Digital Forensics and Incident Response Retainer Services
July 25, 2024
For the second week in a row, Trustwave proudly announces recognition from the ...
Digital Forensics in the Age of Cryptocurrency: Investigating Blockchain and Crypto Crimes
July 10, 2024 | Kushalveer Singh Bachchas
The content of this post is solely the responsibility of the author. LevelBlue ...
How to perform basic digital forensics on a Windows computer
November 20, 2023 | Kushalveer Singh Bachchas
The content of this post is solely the responsibility of the author. LevelBlue ...
Mitigating Deepfake Threats in the Corporate World: A Forensic Approach
November 08, 2023 | Kushalveer Singh Bachchas
The content of this post is solely the responsibility of the author. LevelBlue ...
A guide to digital forensics data acquisition with FTK Imager
November 02, 2023 | Kushalveer Singh Bachchas
The content of this post is solely the responsibility of the author. LevelBlue ...
RAM dump: Understanding its importance and the process
July 31, 2023 | Kushalveer Singh Bachchas
The content of this post is solely the responsibility of the author. LevelBlue ...
What is an incident response plan (IRP) and how effective is your incident response posture?
July 07, 2023 | Marcaé Bryant
As everyone looks about, sirens begin to sound, creating a sense of urgency; ...
What is the difference between incident response & threat hunting?
July 05, 2023 | Mark Stone
The content of this post is solely the responsibility of the author. LevelBlue ...
Digital dumpster diving: Exploring the intricacies of recycle bin forensics
June 20, 2023 | Kushalveer Singh Bachchas
The content of this post is solely the responsibility of the author. LevelBlue ...
Cloud forensics - An introduction to investigating security incidents in AWS, Azure and GCP
April 13, 2023 | Chris Doman
The content of this post is solely the responsibility of the author. LevelBlue ...
Insights from an external incident response team: Strategies to reduce the impact of cybersecurity attacks
March 13, 2023 | Alex Vakulov
The content of this post is solely the responsibility of the author. LevelBlue ...
What is firewall optimization?
March 06, 2023 | Keith Thomas
Firewall optimization (also known as firewall analysis) is the process of ...
2023 Cybersecurity predictions
December 13, 2022 | Theresa Lanowitz
Cybersecurity is a relatively new discipline in the realm of computing. Once ...
Prepare, respond & recover: Battling complex Cybersecurity threats with fundamentals
November 08, 2022 | Robert Woods
The cybersecurity industry has seen a lot of recent trends. For example, the ...
11 Cybersecurity investments you can make right now
October 27, 2022 | Anas Baig
This blog was written by an independent guest blogger.
Privileged account management challenges: comparing PIM, PUM and PAM
November 18, 2021 | Alex Vakulov
This blog was written by an independent guest blogger.