Through the Looking Glass of Risk: An Analysis of the SOCI Reforms as a Case Study for critical Infrastructure Security Regulation
October 03, 2022 | Arun Raghu
This blog examines some interesting aspects of the recent reforms to ...
An Inside Look at Russian Cyber Weapons Used Against Ukraine
August 24, 2022 | Karl Sigler
Observing the ongoing conflict between Russia and Ukraine, we can clearly see ...
Protecting the Modern Healthcare Industry Requires Human Expertise and Innovative Partnerships
August 18, 2022
Protecting healthcare-related data requires a special level of technological ...
Executive Order on Improving the Nation’s Cybersecurity: One Year Later
August 12, 2022 | Kevin Kerr
In May 2021, President Joe Biden signed the 30 - page Executive Order (EO) on ...
6 Top Cloud Security Problems – from a GRC consultant’s perspective
July 26, 2022 | Rob Horne
The typical life of a consultant working in the field of governance, risk and ...
When it Comes to Email Security Good Enough is Not Enough
July 07, 2022
There is an underlying constant when it comes to creating a strong defense—the ...
A Cautionary Tale of a Data Breach
June 30, 2022 | Rob Horne
If you're reading this blog, there's a good chance you're familiar with the ...
Now is the time to Partner With Trustwave MDR
June 15, 2022
Trustwave Managed Detection and Response (MDR) is one of the most important ...
CISO's Corner: Cyber Defense Lessons for OT and Supply Chain Infrastructure
June 02, 2022 | Kory Daniels
2022 has been busy in the cyber world. While there were signals in 2021 with ...
Best Practices for Securing Wireless Networks
May 18, 2022
Most organizations employ mobile computing, which utilizes wireless ...
Good Enough is not Enough When It Comes to Database Security
May 10, 2022
The threats facing databases today are numerous and constantly evolving as the ...
MailMarshal: Protecting Against Email-based Threats Has Become Survival of the Fittest
May 10, 2022 | Gary Ulaner
Email security is not a simple check-box item. The need to have a strong email ...
CISO's Corner: 5 Questions to Ask Before Implementing an XDR Program
May 03, 2022 | Kory Daniels
Let's dive head-first into this new security acronym, XDR, or extended ...
Trustwave Security Colony Vendor Assessment: Know Your Vulnerabilities Before Others Do
April 14, 2022
This is the second installment in Trustwave’s in-depth tour of our Security ...
Enhancing Your Operational Technology Resiliency
April 12, 2022 | Luke Kenny
Maintaining cyber resilience across your ecosystem is a significant challenge ...
Purple Team Exercises: Preparing a Cybersecurity Team for a Red Team Attack
March 15, 2022 | Trustwave SpiderLabs
This is the second in a series of blogs that describes the importance and inner ...
5 Ways CISOs Can Leverage the Power of Trustwave Security Colony
March 09, 2022
Home improvement stores like Home Depot and Lowes are the lifeline for a lot of ...
Creating Buy-In for a Cybersecurity Awareness Program
February 17, 2022 | Amelia Gowa
There is more to implementing a successful cybersecurity training program than ...
Red, Purple, and Blue: The Colors of a Successful Cybersecurity Testing Program
February 10, 2022 | John Cartrett
This is the first in a series of blogs that will describe the importance of ...
Webinar - The Age of MSSPs: Uncovering the Why’s of Managed Services
February 07, 2022
With security risks continuously mounting and the threat landscape evolving at ...
Data Assessment in Healthcare: Knowing What Data You Have Is Half the Battle
February 04, 2022 | Don White
When it comes to protecting personal healthcare information or a medical ...
How Data Privacy Has Evolved in the Age of the Breach
January 28, 2022 | Luke Kenny
As Data Privacy Day once again rolls around, we can look back at some healthy ...
The Year in Review: Looking Back at the Top LevelBlue Blog Posts
December 21, 2021
The most popular LevelBlue blog posts in 2021 were indicative of the year ...
The Cybersecurity Playbook You Need to Run To Mitigate Risk During M&A
December 09, 2021 | Luke Kenny
Mergers and acquisitions are high-risk endeavors, sometimes with billions of ...
MDR Is No Longer ‘Nice to Have’ for Cyber Resilience, It’s Mandatory
December 06, 2021 | Darren Van Booven
In today’s evolving threat landscape, the decision of whether to bring in ...
Cybersecurity in the Year Ahead: Trustwave 2022 Cybersecurity Predictions – Part 2
December 01, 2021
This is part 2 of Trustwave’s 2022 Cybersecurity Predictions blog series.
The Great Cybersecurity Talent Migration has Begun, Here’s What you Can Do
November 23, 2021 | Jason Whyte
The macro-economic consequences of COVID-19 have reached cybersecurity and the ...
Crisis Simulation: The 4 Most Common Cybersecurity Incident Shortfalls
November 11, 2021
For an organization to be resilient, key personnel must be acutely aware of ...