LevelBlue Managed WAAP Enables Organizations to Solve Day 1 WAAP Implementation Challenges

September 23, 2025 | Dora Miranda

10 Critical Capabilities of API Detection and Response

August 26, 2025 | Tawnya Lancaster

Web Application and API Protection (WAAP) solutions have become increasingly ...

Cybersecurity Shadows: Plato’s Cave and the Dark Side of Organizational Change

August 21, 2025 | David Bevett

“How could they see anything but the shadows if they were never allowed to move ...

What Is Social Engineering in Cybersecurity?

July 29, 2025 | Daniel Ghillione

How many times have you heard the phrase “don’t trust strangers”? The key point ...

What Is a DDoS Attack?

July 22, 2025 | Daniel Ghillione

Companies face increasingly complex challenges every day, including ...

Different Types of Malware Explained

July 17, 2025 | Daniel Ghillione

The internet isn’t always a safe place. Behind every click, every download, and ...

Why Zero Trust Is Essential for Effective Cybersecurity

July 15, 2025 | Daniel Ghillione

Let’s face it—cybersecurity is no longer a game of building taller walls or ...

What Is Smishing?

July 14, 2025 | Daniel Ghillione

Text messages used to be a safe space—quick birthday wishes, delivery updates, ...

LevelBlue Momentum Continues with Two Acquisitions

July 10, 2025 | Sundhar Annamalai

In late May, I wrote a blog post titled “One Year of LevelBlue: Milestones, ...

Is Your Software Supply Chain a Weak Link?

July 09, 2025 | Theresa Lanowitz

Knowing Your Software Supply Chain Software complexity is increasing at ...

How to Improve Computer Network Security for Your Business

July 07, 2025 | Daniel Ghillione

Regardless of size or industry, all companies are exposed to potential cyber ...

AI in Endpoint Security

June 30, 2025 | Daniel Ghillione

It’s no revelation to say that the world of connectivity has fundamentally ...

AI in Endpoint Security

June 30, 2025 | Daniel Ghillione

It’s no revelation to say that the world of connectivity has fundamentally ...

What Is an Advanced Persistent Threat (APT)?

June 26, 2025 | Daniel Ghillione

If the term “cyber threat” alone is enough to make any company nervous, imagine ...

Why OCM Is Integral to AI Governance and Compliance

June 23, 2025 | David Bevett

Summary As organizations race to adopt artificial intelligence, many overlook a ...

What Is Phishing? Common Attacks Explained

June 18, 2025 | Daniel Ghillione

Phishing remains one of the biggest cyber threats in circulation today. ...

Stories from the SOC – ClickFix and Chill, Now Here’s the Ransomware Bill

June 18, 2025 | Anthony Alvarado

Background

Cybersecurity Consulting and Ransomware Updates, May

June 10, 2025 | Bindu Sundaresan

What CISOs Need to Know Now Each month brings new evidence that cybersecurity ...

Looking Ahead: A Conversation with LevelBlue Leaders on What's Next for the Company

June 10, 2025 | Daniel Ghillione

One year into our journey, we’re not just celebrating where we’ve been, but ...

What Is a Honeypot in Cybersecurity?

June 05, 2025 | Daniel Ghillione

New Spotlight Report on Healthcare Identifies the Need for a Culture of Cybersecurity

June 04, 2025 | Theresa Lanowitz

New Global Data Helps Set Priorities in Preparation for Emerging Attacks ...

How We Break Into Companies (So You Can Stop Us)

May 29, 2025 | Kazi Arif

When most people think of cybersecurity breaches, they imagine hackers cracking ...

Network Security vs. Endpoint Security: Key Differences and Best Practices

May 22, 2025 | Daniel Ghillione

When it comes to cybersecurity, there are many different systems to consider. ...

Hunting Malware with MSHTA and CyberChef: A Deep Dive into Obfuscation in Malicious Scripts and Credential Theft

May 21, 2025 | Sean Shirley

Recently, our team came across an alert involving mshta.exe, a native Windows ...

One Year of LevelBlue: Milestones, Momentum, and a Vision for the Future

May 21, 2025 | Sundhar Annamalai

This month marks an exciting milestone – LevelBlue’s first anniversary. One ...

DDoS Protection: Insurance Policy or Proactive Defense?

May 20, 2025 | Tawnya Lancaster

Historically, smaller organizations or those outside highly targeted industries ...

DDoS Protection: Insurance Policy or Proactive Defense?

May 20, 2025 | Tawnya Lancaster

Historically, smaller organizations or those outside highly targeted industries ...

It’s Time! All PCI 4.0 Requirements Are Now in Effect

May 06, 2025 | Robert Davidson

Since April 2025, version 4.0.1 of the PCI DSS standard has become the sole ...