LevelBlue Managed WAAP Enables Organizations to Solve Day 1 WAAP Implementation Challenges
September 23, 2025 | Dora Miranda
Stay Informed
Sign up to receive the latest security news and trends straight to your inbox from LevelBlue.
10 Critical Capabilities of API Detection and Response
August 26, 2025 | Tawnya Lancaster
Web Application and API Protection (WAAP) solutions have become increasingly ...
Cybersecurity Shadows: Plato’s Cave and the Dark Side of Organizational Change
August 21, 2025 | David Bevett
“How could they see anything but the shadows if they were never allowed to move ...
What Is Social Engineering in Cybersecurity?
July 29, 2025 | Daniel Ghillione
How many times have you heard the phrase “don’t trust strangers”? The key point ...
What Is a DDoS Attack?
July 22, 2025 | Daniel Ghillione
Companies face increasingly complex challenges every day, including ...
Different Types of Malware Explained
July 17, 2025 | Daniel Ghillione
The internet isn’t always a safe place. Behind every click, every download, and ...
Why Zero Trust Is Essential for Effective Cybersecurity
July 15, 2025 | Daniel Ghillione
Let’s face it—cybersecurity is no longer a game of building taller walls or ...
What Is Smishing?
July 14, 2025 | Daniel Ghillione
Text messages used to be a safe space—quick birthday wishes, delivery updates, ...
LevelBlue Momentum Continues with Two Acquisitions
July 10, 2025 | Sundhar Annamalai
In late May, I wrote a blog post titled “One Year of LevelBlue: Milestones, ...
Is Your Software Supply Chain a Weak Link?
July 09, 2025 | Theresa Lanowitz
Knowing Your Software Supply Chain Software complexity is increasing at ...
How to Improve Computer Network Security for Your Business
July 07, 2025 | Daniel Ghillione
Regardless of size or industry, all companies are exposed to potential cyber ...
AI in Endpoint Security
June 30, 2025 | Daniel Ghillione
It’s no revelation to say that the world of connectivity has fundamentally ...
AI in Endpoint Security
June 30, 2025 | Daniel Ghillione
It’s no revelation to say that the world of connectivity has fundamentally ...
What Is an Advanced Persistent Threat (APT)?
June 26, 2025 | Daniel Ghillione
If the term “cyber threat” alone is enough to make any company nervous, imagine ...
Why OCM Is Integral to AI Governance and Compliance
June 23, 2025 | David Bevett
Summary As organizations race to adopt artificial intelligence, many overlook a ...
What Is Phishing? Common Attacks Explained
June 18, 2025 | Daniel Ghillione
Phishing remains one of the biggest cyber threats in circulation today. ...
Stories from the SOC – ClickFix and Chill, Now Here’s the Ransomware Bill
June 18, 2025 | Anthony Alvarado
Background
Cybersecurity Consulting and Ransomware Updates, May
June 10, 2025 | Bindu Sundaresan
What CISOs Need to Know Now Each month brings new evidence that cybersecurity ...
Looking Ahead: A Conversation with LevelBlue Leaders on What's Next for the Company
June 10, 2025 | Daniel Ghillione
One year into our journey, we’re not just celebrating where we’ve been, but ...
What Is a Honeypot in Cybersecurity?
June 05, 2025 | Daniel Ghillione
New Spotlight Report on Healthcare Identifies the Need for a Culture of Cybersecurity
June 04, 2025 | Theresa Lanowitz
New Global Data Helps Set Priorities in Preparation for Emerging Attacks ...
How We Break Into Companies (So You Can Stop Us)
May 29, 2025 | Kazi Arif
When most people think of cybersecurity breaches, they imagine hackers cracking ...
Network Security vs. Endpoint Security: Key Differences and Best Practices
May 22, 2025 | Daniel Ghillione
When it comes to cybersecurity, there are many different systems to consider. ...
Hunting Malware with MSHTA and CyberChef: A Deep Dive into Obfuscation in Malicious Scripts and Credential Theft
May 21, 2025 | Sean Shirley
Recently, our team came across an alert involving mshta.exe, a native Windows ...
One Year of LevelBlue: Milestones, Momentum, and a Vision for the Future
May 21, 2025 | Sundhar Annamalai
This month marks an exciting milestone – LevelBlue’s first anniversary. One ...
DDoS Protection: Insurance Policy or Proactive Defense?
May 20, 2025 | Tawnya Lancaster
Historically, smaller organizations or those outside highly targeted industries ...
DDoS Protection: Insurance Policy or Proactive Defense?
May 20, 2025 | Tawnya Lancaster
Historically, smaller organizations or those outside highly targeted industries ...
It’s Time! All PCI 4.0 Requirements Are Now in Effect
May 06, 2025 | Robert Davidson
Since April 2025, version 4.0.1 of the PCI DSS standard has become the sole ...