The Resilience Retainer: Incident Response Retainers, Reimagined

March 03, 2026

Identity & Beyond: 2026 Incident Response Predictions

January 14, 2026 | Jamie Mamroe

In 2026, incident response (IR) will continue its shift away from traditional ...

SpiderLabs Ransomware Tracker Update October 2025: Qilin Doubles Down on Attacks

November 04, 2025

The worldwide ransomware landscape saw a dramatic shift in attacks in October ...

Why DFIR: A Guide to Digital Forensics and Incident Response Services and Retainers

September 15, 2025

Digital Forensics and Incident Response (DFIR) services are a critical part of ...

Deep Dive: A DFIR Case Study in Hospitality

May 22, 2025

Phishing in Hospitality: Real-world case study reveals how QR codes and fake ...

Ransomware Response Plan: What Steps Schools and Libraries Should Take After an Attack

May 14, 2025 | Sarah Manley

In Part 1 of this blog series The Ransomware Threat: Preparing Schools and ...

From Fast to Smart: Rethinking Incident Response Metrics

April 23, 2025 | Bindu Sundaresan

In cybersecurity, speed has always been a big deal. How quickly can you detect ...

Reduce Your Risk: Improve Your Incident Readiness and Response Program to Drive Operational Efficiency

April 21, 2025 | Marina Johnson

Cyberattacks continue to evolve and increase in frequency, making it difficult ...

Cybersecurity Consulting and Ransomware Updates, February

March 05, 2025 | Bindu Sundaresan

Each month, we break down critical cybersecurity developments, equipping ...

How Agentic AI Is Transforming Enterprise Software Development and Cybersecurity

March 03, 2025 | Theodoros Karasavvas

Agentic AI represents the next step in artificial intelligence, moving beyond ...

Defending Healthcare: LevelBlue’s Dedication to Fight Cyber Threats to Patient Safety

August 15, 2024

Hospitals face a challenging dilemma: delivering the highest quality of medical ...

Trustwave Named as a Representative Vendor in the 2024 Gartner® Market Guide for Digital Forensics and Incident Response Retainer Services

July 25, 2024

For the second week in a row, Trustwave proudly announces recognition from the ...

Digital Forensics in the Age of Cryptocurrency: Investigating Blockchain and Crypto Crimes

July 10, 2024 | Kushalveer Singh Bachchas

The content of this post is solely the responsibility of the author. LevelBlue ...

How to perform basic digital forensics on a Windows computer

November 20, 2023 | Kushalveer Singh Bachchas

The content of this post is solely the responsibility of the author. LevelBlue ...

Mitigating Deepfake Threats in the Corporate World: A Forensic Approach

November 08, 2023 | Kushalveer Singh Bachchas

The content of this post is solely the responsibility of the author. LevelBlue ...

A guide to digital forensics data acquisition with FTK Imager

November 02, 2023 | Kushalveer Singh Bachchas

The content of this post is solely the responsibility of the author. LevelBlue ...

RAM dump: Understanding its ­­­importance and the process

July 31, 2023 | Kushalveer Singh Bachchas

The content of this post is solely the responsibility of the author. LevelBlue ...

What is an incident response plan (IRP) and how effective is your incident response posture?

July 07, 2023 | Marcaé Bryant

As everyone looks about, sirens begin to sound, creating a sense of urgency; ...

What is the difference between incident response & threat hunting?

July 05, 2023 | Mark Stone

The content of this post is solely the responsibility of the author. LevelBlue ...

Digital dumpster diving: Exploring the intricacies of recycle bin forensics

June 20, 2023 | Kushalveer Singh Bachchas

The content of this post is solely the responsibility of the author. LevelBlue ...

Cloud forensics - An introduction to investigating security incidents in AWS, Azure and GCP

April 13, 2023 | Chris Doman

The content of this post is solely the responsibility of the author. LevelBlue ...

Insights from an external incident response team: Strategies to reduce the impact of cybersecurity attacks

March 13, 2023 | Alex Vakulov

The content of this post is solely the responsibility of the author. LevelBlue ...

What is firewall optimization?

March 06, 2023 | Keith Thomas

Firewall optimization (also known as firewall analysis) is the process of ...

2023 Cybersecurity predictions

December 13, 2022 | Theresa Lanowitz

Cybersecurity is a relatively new discipline in the realm of computing. Once ...

Prepare, respond & recover: Battling complex Cybersecurity threats with fundamentals

November 08, 2022 | Robert Woods

The cybersecurity industry has seen a lot of recent trends. For example, the ...

11 Cybersecurity investments you can make right now

October 27, 2022 | Anas Baig

This blog was written by an independent guest blogger.

Privileged account management challenges: comparing PIM, PUM and PAM

November 18, 2021 | Alex Vakulov

This blog was written by an independent guest blogger.