LevelBlue Managed WAAP Enables Organizations to Solve Day 1 WAAP Implementation Challenges
September 23, 2025 | Dora Miranda
Stay Informed
Sign up to receive the latest security news and trends straight to your inbox from LevelBlue.
10 Critical Capabilities of API Detection and Response
August 26, 2025 | Tawnya Lancaster
Web Application and API Protection (WAAP) solutions have become increasingly ...
What Is Social Engineering in Cybersecurity?
July 29, 2025 | Daniel Ghillione
How many times have you heard the phrase “don’t trust strangers”? The key point ...
What Is a DDoS Attack?
July 22, 2025 | Daniel Ghillione
Companies face increasingly complex challenges every day, including ...
Different Types of Malware Explained
July 17, 2025 | Daniel Ghillione
The internet isn’t always a safe place. Behind every click, every download, and ...
Why Zero Trust Is Essential for Effective Cybersecurity
July 15, 2025 | Daniel Ghillione
Let’s face it—cybersecurity is no longer a game of building taller walls or ...
What Is Smishing?
July 14, 2025 | Daniel Ghillione
Text messages used to be a safe space—quick birthday wishes, delivery updates, ...
LevelBlue Momentum Continues with Two Acquisitions
July 10, 2025 | Sundhar Annamalai
In late May, I wrote a blog post titled “One Year of LevelBlue: Milestones, ...
Is Your Software Supply Chain a Weak Link?
July 09, 2025 | Theresa Lanowitz
Knowing Your Software Supply Chain Software complexity is increasing at ...
Cybersecurity Consulting and Ransomware Updates, May
June 10, 2025 | Bindu Sundaresan
What CISOs Need to Know Now Each month brings new evidence that cybersecurity ...
Looking Ahead: A Conversation with LevelBlue Leaders on What's Next for the Company
June 10, 2025 | Daniel Ghillione
One year into our journey, we’re not just celebrating where we’ve been, but ...
What Is a Honeypot in Cybersecurity?
June 05, 2025 | Daniel Ghillione
New Spotlight Report on Healthcare Identifies the Need for a Culture of Cybersecurity
June 04, 2025 | Theresa Lanowitz
New Global Data Helps Set Priorities in Preparation for Emerging Attacks ...
How We Break Into Companies (So You Can Stop Us)
May 29, 2025 | Kazi Arif
When most people think of cybersecurity breaches, they imagine hackers cracking ...
Hunting Malware with MSHTA and CyberChef: A Deep Dive into Obfuscation in Malicious Scripts and Credential Theft
May 21, 2025 | Sean Shirley
Recently, our team came across an alert involving mshta.exe, a native Windows ...
DDoS Protection: Insurance Policy or Proactive Defense?
May 20, 2025 | Tawnya Lancaster
Historically, smaller organizations or those outside highly targeted industries ...
It’s Time! All PCI 4.0 Requirements Are Now in Effect
May 06, 2025 | Robert Davidson
Since April 2025, version 4.0.1 of the PCI DSS standard has become the sole ...