Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Asset Discovery and Risk Mapping in Cybersecurity Operations using Deception

Asset discovery and risk mapping represent fundamental components of effective cybersecurity operations. Organizations face significant challenges in maintaining accurate inventories of their IT assets across on-premises, cloud, container, and IoT environments. Deception technology provides technical capabilities that enhance asset discovery while delivering actionable risk intelligence based on adversary behavior.

One Year of LevelBlue: Milestones, Momentum, and a Vision for the Future

This month marks an exciting milestone – LevelBlue’s first anniversary. One year ago, we launched with a clear mission: to simplify cybersecurity and help organizations achieve meaningful, outcome-driven security in an increasingly complex threat landscape. Now, a year in, I’m incredibly proud of how far we’ve come.

Hospitality Under Attack: New Trustwave Report Highlights Cybersecurity Challenges in 2025

As the summer travel season approaches, travelers worldwide are busy booking their holidays, entrusting the hospitality industry with some of their most sensitive personal and financial information. Unfortunately, this makes the sector a prime target for threat actors looking to exploit and steal this data. To help organizations in the hospitality sector address these risks, Trustwave SpiderLabs has released the 2025 Trustwave Risk Radar Report: Hospitality Sector.

How To Implement Privileged Access Management in Your Organization

To implement Privileged Access Management (PAM), you must first assess your organization’s specific security risks and needs. Then, you can select the right PAM solution tailored to your organization and plan a strategic, phased rollout to ensure a smooth implementation. Continue reading to learn how to efficiently implement PAM in your organization.

Lumma Stealer is Out... of business!

Since mid-2024, Bitsight has been collaborating with Microsoft’s Digital Crimes Unit and other partners to dismantle the operational capabilities of Lumma Stealer (LummaC2) — currently the most widely distributed information stealer. Early this week, a coordinated action was carried out to disrupt its operations and take down the supporting malware infrastructure.

CISOs' Unconventional Criteria for Evaluating AI SOC Analysts

Noam Cohen is a serial entrepreneur building seriously cool data and AI companies since 2018. Noam’s insights are informed by a unique combination of data, product, and AI expertise — with a background that includes winning the Israel Defense Prize for his work in leveraging data to predict terror attacks. As the Head of Artificial Intelligence at Torq, Noam is helping build truly next-gen AI capabilities into Torq’s autonomous SOC platform.

The Next Generation of Full Stack Protection: Smarter Controls, Safer DeFi, and Full-Stack Protection

The crypto market has grown to over $3.2 trillion, driven by institutional adoption, stablecoin innovation, and a boost in DeFi activity. But every new dollar—and every new user—expands the attack surface potential. From credential stuffing and phishing, to malicious smart contracts and front-end exploits, today’s threat landscape is broader, faster, and more sophisticated than ever.

Powering the Next Era of Digital Value

Powering over 2,000 businesses and securing more than $10 trillion in digital asset transactions , we know what it takes not just to participate in this new economy — but to lead it. In the past 12 months, we’ve seen a clear shift. Crypto is entering the mainstream — and fast. With digital assets getting integrated into modern finance, the infrastructure supporting them must rise to the occasion — purpose-built for scale, security, and resilience.

Simplifying the shared responsibility model: How to meet your cloud security obligations

The shared responsibility model, introduced by AWS in 2011, defines the division of cloud security responsibilities between cloud providers and customers. Cloud providers are responsible for securing their physical infrastructure, while customers are responsible for securing their own data, configurations, and access. Cloud environments have grown and become much more complex since 2011.

Cybersecurity Gaps in Education: Addressing Risks in Schools and Universities

Cybersecurity gaps in education have become more prevalent than ever. The education sector sits at the crossroads of healthcare, finance, and technology—and as institutions digitize more functions, their exposure to cybersecurity threats grows. From health clinic portals to online tuition payments and classroom platforms for minors, schools and universities handle sensitive data governed by laws such as HIPAA, PCI DSS, and COPPA.