Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Cyber Resilience Act and DORA: Driving Continuous Cybersecurity

The EU Cyber Resilience Act (CRA) and the Digital Operational Resilience Act (DORA) are shaping the regulatory landscape for cybersecurity in Europe and across the globe. While DORA focuses on the financial sector and ICT providers, the upcoming CRA will extend requirements to all digital products and services, emphasizing secure-by-design practices and software resilience.

Incident Command Systems: How To Establish an ICS

Standardizing the management and coordination of incident response and resolution activities across different independent agencies is challenging. As part of its mission to help people before, during, and after disasters, the Federal Emergency Management Agency (FEMA) created the Incident Command System (ICS) as one of the components of the National Incident Management System (NIMS).

Securing AI agents: privileged machine identities at unprecedented scale

Earlier in 2025, an AI agent named Claudius made headlines when it insisted it was human, promising to deliver products in “a blue blazer and red tie.” Quirky? Sure. But beneath the strange admission sat a more important truth: today’s AI agents aren’t just chatbots with puppet-like ambitions, whose untruths would be betrayed by a growing nose. They’ve evolved into actors with real credentials, access, and autonomy.

SonicWall Concludes Investigation Into Incident Affecting MySonicWall Configuration Backup Files

On September 17, 2025, SonicWall released a knowledge base article detailing the exposure of firewall configuration backup files stored in certain MySonicWall accounts. As of October 8, 2025, the investigation has concluded and SonicWall has updated their advisory accordingly.

Roadmap to Community Cyber Defense with Sarah Powazek, Program Director, UC Berkeley CLTC [254]

Cybersecurity Defenders Podcast - Episode 254: Roadmap to Community Cyber Defense with Sarah Powazek, Program Director, UC Berkeley CLTC A podcast about cybersecurity and the people that keep the internet safe.

AI can do what now?! Agentic AI is the autonomous future coming to security operations

Agentic AI in cybersecurity promises to transform workflows as we know them, enabling a new level of personalization, automation, efficiency, and innovation. It’s already being deployed by security teams for use cases like autonomous threat detection and response, advanced threat hunting, automated incident investigation, real-time fraud protection, and more. So, how is agentic AI working overtime to help security analysts build a more resilient security posture?

Trustwave Named a Leader in IDC MarketScape: Asia/Pacific (Excluding Japan) MDR Services 2025

Trustwave, A LevelBlue Company, was named a Leader in the IDC MarketScape: Asia/Pacific (Excluding Japan) Managed Detection and Response Services 2025 Vendor Assessment (doc # AP52998725e, September 2025). The excerpt noted that Trustwave offers a comprehensive suite of security services that span MDR, MXDR, managed SIEM, co-managed SOC, threat hunting, DFIR, Security Colony, and threat intelligence services.

Dark Web Sites: How Data is Traded and Protected

We have all heard of the phrase ‘Dark Web’, but on our computers and mobile devices, we see ordinary websites displaying everyday content. It’s only in movies that we see people in dark rooms scrabbling through endless streams of data, which we assume isthe so-called ‘Dark Web’. But the reality of the dark web is a lot more horrifying and complex than what you and I could ever imagine. Contents hide What is the Dark Web? How Stolen Data is Traded on Dark Web Sites?