LevelBlue Managed WAAP Enables Organizations to Solve Day 1 WAAP Implementation Challenges

September 23, 2025 | Dora Miranda

10 Critical Capabilities of API Detection and Response

August 26, 2025 | Tawnya Lancaster

Web Application and API Protection (WAAP) solutions have become increasingly ...

What Is Social Engineering in Cybersecurity?

July 29, 2025 | Daniel Ghillione

How many times have you heard the phrase “don’t trust strangers”? The key point ...

What Is a DDoS Attack?

July 22, 2025 | Daniel Ghillione

Companies face increasingly complex challenges every day, including ...

Different Types of Malware Explained

July 17, 2025 | Daniel Ghillione

The internet isn’t always a safe place. Behind every click, every download, and ...

Why Zero Trust Is Essential for Effective Cybersecurity

July 15, 2025 | Daniel Ghillione

Let’s face it—cybersecurity is no longer a game of building taller walls or ...

What Is Smishing?

July 14, 2025 | Daniel Ghillione

Text messages used to be a safe space—quick birthday wishes, delivery updates, ...

LevelBlue Momentum Continues with Two Acquisitions

July 10, 2025 | Sundhar Annamalai

In late May, I wrote a blog post titled “One Year of LevelBlue: Milestones, ...

Is Your Software Supply Chain a Weak Link?

July 09, 2025 | Theresa Lanowitz

Knowing Your Software Supply Chain Software complexity is increasing at ...

Cybersecurity Consulting and Ransomware Updates, May

June 10, 2025 | Bindu Sundaresan

What CISOs Need to Know Now Each month brings new evidence that cybersecurity ...

Looking Ahead: A Conversation with LevelBlue Leaders on What's Next for the Company

June 10, 2025 | Daniel Ghillione

One year into our journey, we’re not just celebrating where we’ve been, but ...

What Is a Honeypot in Cybersecurity?

June 05, 2025 | Daniel Ghillione

New Spotlight Report on Healthcare Identifies the Need for a Culture of Cybersecurity

June 04, 2025 | Theresa Lanowitz

New Global Data Helps Set Priorities in Preparation for Emerging Attacks ...

How We Break Into Companies (So You Can Stop Us)

May 29, 2025 | Kazi Arif

When most people think of cybersecurity breaches, they imagine hackers cracking ...

Hunting Malware with MSHTA and CyberChef: A Deep Dive into Obfuscation in Malicious Scripts and Credential Theft

May 21, 2025 | Sean Shirley

Recently, our team came across an alert involving mshta.exe, a native Windows ...

DDoS Protection: Insurance Policy or Proactive Defense?

May 20, 2025 | Tawnya Lancaster

Historically, smaller organizations or those outside highly targeted industries ...

It’s Time! All PCI 4.0 Requirements Are Now in Effect

May 06, 2025 | Robert Davidson

Since April 2025, version 4.0.1 of the PCI DSS standard has become the sole ...