Through the Looking Glass of Risk: An Analysis of the SOCI Reforms as a Case Study for critical Infrastructure Security Regulation

October 03, 2022 | Arun Raghu

This blog examines some interesting aspects of the recent reforms to ...

An Inside Look at Russian Cyber Weapons Used Against Ukraine

August 24, 2022 | Karl Sigler

Observing the ongoing conflict between Russia and Ukraine, we can clearly see ...

Protecting the Modern Healthcare Industry Requires Human Expertise and Innovative Partnerships

August 18, 2022

Protecting healthcare-related data requires a special level of technological ...

Executive Order on Improving the Nation’s Cybersecurity: One Year Later

August 12, 2022 | Kevin Kerr

In May 2021, President Joe Biden signed the 30 - page Executive Order (EO) on ...

6 Top Cloud Security Problems – from a GRC consultant’s perspective

July 26, 2022 | Rob Horne

The typical life of a consultant working in the field of governance, risk and ...

When it Comes to Email Security Good Enough is Not Enough

July 07, 2022

There is an underlying constant when it comes to creating a strong defense—the ...

A Cautionary Tale of a Data Breach

June 30, 2022 | Rob Horne

If you're reading this blog, there's a good chance you're familiar with the ...

Now is the time to Partner With Trustwave MDR

June 15, 2022

Trustwave Managed Detection and Response (MDR) is one of the most important ...

CISO's Corner: Cyber Defense Lessons for OT and Supply Chain Infrastructure

June 02, 2022 | Kory Daniels

2022 has been busy in the cyber world. While there were signals in 2021 with ...

Best Practices for Securing Wireless Networks

May 18, 2022

Most organizations employ mobile computing, which utilizes wireless ...

Good Enough is not Enough When It Comes to Database Security

May 10, 2022

The threats facing databases today are numerous and constantly evolving as the ...

MailMarshal: Protecting Against Email-based Threats Has Become Survival of the Fittest

May 10, 2022 | Gary Ulaner

Email security is not a simple check-box item. The need to have a strong email ...

CISO's Corner: 5 Questions to Ask Before Implementing an XDR Program

May 03, 2022 | Kory Daniels

Let's dive head-first into this new security acronym, XDR, or extended ...

Trustwave Security Colony Vendor Assessment: Know Your Vulnerabilities Before Others Do

April 14, 2022

This is the second installment in Trustwave’s in-depth tour of our Security ...

Enhancing Your Operational Technology Resiliency

April 12, 2022 | Luke Kenny

Maintaining cyber resilience across your ecosystem is a significant challenge ...

Purple Team Exercises: Preparing a Cybersecurity Team for a Red Team Attack

March 15, 2022 | Trustwave SpiderLabs

This is the second in a series of blogs that describes the importance and inner ...

5 Ways CISOs Can Leverage the Power of Trustwave Security Colony

March 09, 2022

Home improvement stores like Home Depot and Lowes are the lifeline for a lot of ...

Creating Buy-In for a Cybersecurity Awareness Program

February 17, 2022 | Amelia Gowa

There is more to implementing a successful cybersecurity training program than ...

Red, Purple, and Blue: The Colors of a Successful Cybersecurity Testing Program

February 10, 2022 | John Cartrett

This is the first in a series of blogs that will describe the importance of ...

Webinar - The Age of MSSPs: Uncovering the Why’s of Managed Services

February 07, 2022

With security risks continuously mounting and the threat landscape evolving at ...

Data Assessment in Healthcare: Knowing What Data You Have Is Half the Battle

February 04, 2022 | Don White

When it comes to protecting personal healthcare information or a medical ...

How Data Privacy Has Evolved in the Age of the Breach

January 28, 2022 | Luke Kenny

As Data Privacy Day once again rolls around, we can look back at some healthy ...

The Year in Review: Looking Back at the Top LevelBlue Blog Posts

December 21, 2021

The most popular LevelBlue blog posts in 2021 were indicative of the year ...

The Cybersecurity Playbook You Need to Run To Mitigate Risk During M&A

December 09, 2021 | Luke Kenny

Mergers and acquisitions are high-risk endeavors, sometimes with billions of ...

MDR Is No Longer ‘Nice to Have’ for Cyber Resilience, It’s Mandatory

December 06, 2021 | Darren Van Booven

In today’s evolving threat landscape, the decision of whether to bring in ...

Cybersecurity in the Year Ahead: Trustwave 2022 Cybersecurity Predictions – Part 2

December 01, 2021

This is part 2 of Trustwave’s 2022 Cybersecurity Predictions blog series.

The Great Cybersecurity Talent Migration has Begun, Here’s What you Can Do

November 23, 2021 | Jason Whyte

The macro-economic consequences of COVID-19 have reached cybersecurity and the ...

Crisis Simulation: The 4 Most Common Cybersecurity Incident Shortfalls

November 11, 2021

For an organization to be resilient, key personnel must be acutely aware of ...