Answering 8 Questions About Trustwave Managed Vulnerability Scanning (MVS)

June 12, 2025

Understanding and mitigating vulnerabilities is paramount for any organization. ...

Cybersecurity in UK Hospitality: Navigating Compliance, Threats, and Resource Constraints

June 11, 2025 | Ed Williams

Many of the largest hospitality organizations operate on a global scale. While ...

Cybersecurity Consulting and Ransomware Updates, May

June 10, 2025 | Bindu Sundaresan

What CISOs Need to Know Now Each month brings new evidence that cybersecurity ...

Looking Ahead: A Conversation with LevelBlue Leaders on What's Next for the Company

June 10, 2025 | Daniel Ghillione

One year into our journey, we’re not just celebrating where we’ve been, but ...

Government Data Breaches Are Eroding Public Trust – It’s Time for Stronger Cybersecurity in the Public Sector

June 09, 2025 | Craig Searle

The recent data breach at the Australian Human Rights Commission (AHRC) is a ...

MDR vs SIEM: Which is Right for Your Organization?

June 06, 2025

The decision to buy a Security Information and Event Management (SIEM) product ...

What Is a Honeypot in Cybersecurity?

June 05, 2025 | Daniel Ghillione

Using Password 123456 is Bad, but No Password is Worse

June 05, 2025

An independent cybersecurity researcher claims to have uncovered a breach of an ...

New Spotlight Report on Healthcare Identifies the Need for a Culture of Cybersecurity

June 04, 2025 | Theresa Lanowitz

New Global Data Helps Set Priorities in Preparation for Emerging Attacks ...

Phishing-as-a-Service (PhaaS): A Cybercrime Subscription Service

June 04, 2025

Phishing-as-a-Service (PhaaS) is skyrocketing, making sophisticated phishing ...

From Metric to Mandate, How CIOs and CISOs Can Operationalize Microsoft Secure Score

June 03, 2025 | Grant Hutchons

This blog is the third part of our series on Microsoft Secure Score. Please ...

What Is Cloud Security and How Can It Benefit Your Business?

June 02, 2025 | Daniel Ghillione

Implementing cloud security policies and technologies has seen sustained growth ...

Red Teaming Around the World (UK and Europe vs. US)

June 02, 2025 | Philip Pieterse

Regional Nuances: Explore the key differences in Red Teaming approaches across ...

Regulations Rising, Risks Persisting: The Cybersecurity Crossroads Facing Australian Hospitality

May 30, 2025 | Craig Searle

Australian hospitality is facing rising cyber threats as ransomware attacks, ...

Preventing Supply Chain Cyberattacks: Lessons from the Marks & Spencer Breach

May 29, 2025

Marks & Spencer’s £300M Ransomware Fallout: A sophisticated supply chain ...

How We Break Into Companies (So You Can Stop Us)

May 29, 2025 | Kazi Arif

When most people think of cybersecurity breaches, they imagine hackers cracking ...

Trustwave Named a Representative Vendor in 2025 Gartner® Market Guide for Third-Party Risk Management Technology Solutions

May 28, 2025

The industry analyst firm Gartner® has named Trustwave a Representative Vendor ...

Navigating the Boardroom: Elevating Cybersecurity Conversations with Leadership

May 27, 2025

It's almost a tradition in cybersecurity circles to say the Board of Directors' ...

How Dark Web Travel Agencies and Fraud Impact the Hospitality Industry

May 23, 2025

Dark Web Travel Agencies: Discover how stolen hospitality data fuels fraudulent ...

Network Security vs. Endpoint Security: Key Differences and Best Practices

May 22, 2025 | Daniel Ghillione

When it comes to cybersecurity, there are many different systems to consider. ...

Deep Dive: A DFIR Case Study in Hospitality

May 22, 2025

Phishing in Hospitality: Real-world case study reveals how QR codes and fake ...

One Year of LevelBlue: Milestones, Momentum, and a Vision for the Future

May 21, 2025 | Sundhar Annamalai

This month marks an exciting milestone – LevelBlue’s first anniversary. One ...

Trustwave SpiderLabs Report Highlights Ransomware and Dark Web Dangers for the Hospitality Sector

May 21, 2025

New Trustwave SpiderLabs report reveals rising ransomware and dark web risks ...

Hunting Malware with MSHTA and CyberChef: A Deep Dive into Obfuscation in Malicious Scripts and Credential Theft

May 21, 2025 | Sean Shirley

Recently, our team came across an alert involving mshta.exe, a native Windows ...

DDoS Protection: Insurance Policy or Proactive Defense?

May 20, 2025 | Tawnya Lancaster

Historically, smaller organizations or those outside highly targeted industries ...

Trustwave Launches MailMarshal Integrated Cloud to Enhance Email Security for Microsoft 365 Environments

May 19, 2025

Discover how Trustwave MailMarshal Integrated Cloud enhances your Microsoft 365 ...

It’s Time to Prepare as Scattered Spider Spreads Its Web to the US

May 19, 2025

DFIR: Enhance your cybersecurity resilience with Trustwave's DFIR retainer ...

What Is Generative AI? Business Guide & Security Tips

May 15, 2025 | Daniel Ghillione

In today’s rapidly evolving digital landscape, generative AI has emerged as a ...