Answering 8 Questions About Trustwave Managed Vulnerability Scanning (MVS)
June 12, 2025
Understanding and mitigating vulnerabilities is paramount for any organization. ...
Cybersecurity in UK Hospitality: Navigating Compliance, Threats, and Resource Constraints
June 11, 2025 | Ed Williams
Many of the largest hospitality organizations operate on a global scale. While ...
Cybersecurity Consulting and Ransomware Updates, May
June 10, 2025 | Bindu Sundaresan
What CISOs Need to Know Now Each month brings new evidence that cybersecurity ...
Looking Ahead: A Conversation with LevelBlue Leaders on What's Next for the Company
June 10, 2025 | Daniel Ghillione
One year into our journey, we’re not just celebrating where we’ve been, but ...
Government Data Breaches Are Eroding Public Trust – It’s Time for Stronger Cybersecurity in the Public Sector
June 09, 2025 | Craig Searle
The recent data breach at the Australian Human Rights Commission (AHRC) is a ...
MDR vs SIEM: Which is Right for Your Organization?
June 06, 2025
The decision to buy a Security Information and Event Management (SIEM) product ...
What Is a Honeypot in Cybersecurity?
June 05, 2025 | Daniel Ghillione
Using Password 123456 is Bad, but No Password is Worse
June 05, 2025
An independent cybersecurity researcher claims to have uncovered a breach of an ...
New Spotlight Report on Healthcare Identifies the Need for a Culture of Cybersecurity
June 04, 2025 | Theresa Lanowitz
New Global Data Helps Set Priorities in Preparation for Emerging Attacks ...
Phishing-as-a-Service (PhaaS): A Cybercrime Subscription Service
June 04, 2025
Phishing-as-a-Service (PhaaS) is skyrocketing, making sophisticated phishing ...
From Metric to Mandate, How CIOs and CISOs Can Operationalize Microsoft Secure Score
June 03, 2025 | Grant Hutchons
This blog is the third part of our series on Microsoft Secure Score. Please ...
What Is Cloud Security and How Can It Benefit Your Business?
June 02, 2025 | Daniel Ghillione
Implementing cloud security policies and technologies has seen sustained growth ...
Red Teaming Around the World (UK and Europe vs. US)
June 02, 2025 | Philip Pieterse
Regional Nuances: Explore the key differences in Red Teaming approaches across ...
Regulations Rising, Risks Persisting: The Cybersecurity Crossroads Facing Australian Hospitality
May 30, 2025 | Craig Searle
Australian hospitality is facing rising cyber threats as ransomware attacks, ...
Preventing Supply Chain Cyberattacks: Lessons from the Marks & Spencer Breach
May 29, 2025
Marks & Spencer’s £300M Ransomware Fallout: A sophisticated supply chain ...
How We Break Into Companies (So You Can Stop Us)
May 29, 2025 | Kazi Arif
When most people think of cybersecurity breaches, they imagine hackers cracking ...
Trustwave Named a Representative Vendor in 2025 Gartner® Market Guide for Third-Party Risk Management Technology Solutions
May 28, 2025
The industry analyst firm Gartner® has named Trustwave a Representative Vendor ...
Navigating the Boardroom: Elevating Cybersecurity Conversations with Leadership
May 27, 2025
It's almost a tradition in cybersecurity circles to say the Board of Directors' ...
How Dark Web Travel Agencies and Fraud Impact the Hospitality Industry
May 23, 2025
Dark Web Travel Agencies: Discover how stolen hospitality data fuels fraudulent ...
Network Security vs. Endpoint Security: Key Differences and Best Practices
May 22, 2025 | Daniel Ghillione
When it comes to cybersecurity, there are many different systems to consider. ...
Deep Dive: A DFIR Case Study in Hospitality
May 22, 2025
Phishing in Hospitality: Real-world case study reveals how QR codes and fake ...
One Year of LevelBlue: Milestones, Momentum, and a Vision for the Future
May 21, 2025 | Sundhar Annamalai
This month marks an exciting milestone – LevelBlue’s first anniversary. One ...
Trustwave SpiderLabs Report Highlights Ransomware and Dark Web Dangers for the Hospitality Sector
May 21, 2025
New Trustwave SpiderLabs report reveals rising ransomware and dark web risks ...
Hunting Malware with MSHTA and CyberChef: A Deep Dive into Obfuscation in Malicious Scripts and Credential Theft
May 21, 2025 | Sean Shirley
Recently, our team came across an alert involving mshta.exe, a native Windows ...
DDoS Protection: Insurance Policy or Proactive Defense?
May 20, 2025 | Tawnya Lancaster
Historically, smaller organizations or those outside highly targeted industries ...
Trustwave Launches MailMarshal Integrated Cloud to Enhance Email Security for Microsoft 365 Environments
May 19, 2025
Discover how Trustwave MailMarshal Integrated Cloud enhances your Microsoft 365 ...
It’s Time to Prepare as Scattered Spider Spreads Its Web to the US
May 19, 2025
DFIR: Enhance your cybersecurity resilience with Trustwave's DFIR retainer ...
What Is Generative AI? Business Guide & Security Tips
May 15, 2025 | Daniel Ghillione
In today’s rapidly evolving digital landscape, generative AI has emerged as a ...