Unraveling the True Cost of Ransomware Attacks and Essential Strategies for Mitigation
March 06, 2024 | Barry O’Connell
A ransomware attack can demoralize or debilitate organizations quite like no ...
Managed Detection and Response: A Cure for Cyber Alert Fatigue and Scalability Challenges
March 04, 2024
Alert fatigue is a long-standing problem in cybersecurity that only increases ...
The endpoint evolution - Evolving from traditional endpoints to cloud or containerized workloads and the security solutions to protect them
February 27, 2024 | Rich Spohnholz
As organizations grow and more endpoints are added across the enterprise, they ...
Defending Healthcare Databases: Strategies to Safeguard Critical Information
February 23, 2024
The healthcare sector continues to be a primary target for threat actors, with ...
A fundamental guide to endpoint security
February 20, 2024 | Mary Blackowiak
Anyone that utilizes technology in their daily lives understands that it is ...
Lessons to be Learned: Attacks on Higher Education Proliferate
February 15, 2024
Trustwave SpiderLabs is wrapping up a multi-month investigation into the ...
10 Key Steps to Enhance Mobile Application Security in 2024
February 09, 2024 | Therese Mendoza
In today's digital landscape, ensuring robust security for your mobile ...
Trustwave’s Best Practices for Protecting Against Mother of all Data Breaches
January 24, 2024
The discovery of what has been dubbed the Mother of all Data Breaches (MOAB), ...
Let’s Get Physical with Security Requirements
January 23, 2024 | Jason Whyte
Not every criminal illegally entering a business is looking to steal cash, ...
How a Managed Detection and Response Service Helps Get the Most out of Microsoft Defender XDR
January 12, 2024
For years, Microsoft has been making significant inroads in the security space, ...
Tabletop Exercises: The Key to Recovering From a Devastating Cyberattack
December 14, 2023 | Don White
The exploitation of the CitrixBleed vulnerability in Netscale by a variety of ...
Defending Against ChatGPT-Enhanced Phishing with Managed Detection and Response
December 13, 2023
Phishing, already a serious, ever-present threat, is getting even more ...
Insights into modern fraud detection systems
December 05, 2023 | Alex Vakulov
The content of this post is solely the responsibility of the author. LevelBlue ...
Managing Risk Appetite: Balancing Cybersecurity and Business Growth
November 06, 2023 | Ed Williams
Determining, dealing with, and accepting a certain level of risk will always be ...
Final Cybersecurity Awareness Month Thoughts: Don't Get Hooked By a Phishing Email
October 31, 2023
We close out Cybersecurity Awareness Month for 2023 with a few final points ...
Ensuring Robust Security of a Containerized Environment
October 26, 2023 | David Balaban
The content of this post is solely the responsibility of the author. LevelBlue ...
How a Database Risk Assessment Reduces the Risk of a Cyberattack
October 13, 2023
Database security often, and to an organization's detriment, falls between the ...
Strong Passwords and MFA: Two Easy Fixes to Enhance Your Cybersecurity Posture
October 12, 2023
As 2023 Cybersecurity Awareness Month continues, let's look at a couple of the ...
Focus on these 3 Areas to Develop a Strong Cybersecurity Posture With Fewer Resources
October 05, 2023 | Jason Whyte
Not every organization's security apparatus is built or funded at the same ...
10 Dynamic Principles for Crafting a Robust Database Security Strategy
October 04, 2023
The digital world relies on data, which because of its considerable value, is ...
The Beauty of a Red Team Exercise: When One Discovery Leads to Potentially Saving Lives
September 27, 2023
What started out as a standard Red Team test designed to check the security ...
Resilient networks: Building blocks of modern Cybersecurity architecture
September 12, 2023 | Anas Baig
The content of this post is solely the responsibility of the author. LevelBlue ...
How Trustwave Uses Enterprise Penetration Testing to Fortify a Client's Defensive Posture
August 25, 2023
Anyone who has played a Tower Defense-style game, (Plants Vs. Zombies being a ...
Mobile threat defense or bust
August 23, 2023 | David Wong
The case for unified endpoint management and mobile threat defense
Maximising Your Microsoft Security Environment
August 21, 2023 | Grant Hutchons
If you're a Microsoft-focused organization you may be able to leverage the ...
Securing your cloud networks: Strategies for a resilient infrastructure
August 17, 2023 | Vina Nguyen
The content of this post is solely the responsibility of the author. LevelBlue ...
9 Steps to Protect Against the Next MOVEit/MFT Attack
August 16, 2023
By now, the facts of the recent MOVEit breach are well known (although the ...
How to Build a More Secure and Resilient Supply Chain
August 02, 2023 | Jason Whyte
For threat actors looking to create widespread damage, attacking a third-party ...