From Fast to Smart: Rethinking Incident Response Metrics

April 23, 2025 | Bindu Sundaresan

Incident readiness is crucial for state and local governments

March 11, 2024 | Christina Richmond

The content of this post is solely the responsibility of the author. LevelBlue ...

What is an incident response plan (IRP) and how effective is your incident response posture?

July 07, 2023 | Marcaé Bryant

As everyone looks about, sirens begin to sound, creating a sense of urgency; ...

What is the difference between incident response & threat hunting?

July 05, 2023 | Mark Stone

The content of this post is solely the responsibility of the author. LevelBlue ...

Improving your bottom line with cybersecurity top of mind

April 25, 2023 | Bindu Sundaresan

In times of economic downturn, companies may become reactive in their approach ...

Back to the office…

July 12, 2021 | James Prince

As the world is starting to move out of lockdown, businesses are moving some of ...

Stories from the SOC - Office 365 account compromise and credential abuse

June 23, 2021 | Marcus Hogan

Stories from the SOC is a blog series that describes recent real-world security ...

Automated Incident Response Explained

March 17, 2020 | Julia Kisielius

Everything you need to know about automated incident response Picture this: ...

Post-incident review and the big data problem

July 29, 2019 | Allie Mellen

Across the board, security teams of every industry, organization size, and ...

Incident Response Methodology: The OODA Loop Explained

January 24, 2019 | James Fritz

An incident response methodology can be explained as a collection of procedures ...

Culture Eats Security for Lunch

October 09, 2017 | Javvad Malik

In celebration of Week 2 of National Cyber Security Awareness Month (NCSAM) – ...

Incident Response Automation Challenges (and How USM Anywhere Can Help)

July 10, 2017 | Julia Kisielius

According to the SANS 2017 Incident Response Capabilities Survey, 47% of ...

Incident Response Orchestration: What Is It and How Can It Help?

May 30, 2017 | Julia Kisielius

The other day, I invited about twelve friends to my apartment for dinner—on a ...

Beginner’s Guide to Open Source Incident Response Tools and Resources

February 21, 2017 | James Fritz

**OSSIM is no longer in use as we focus on delivering enhanced solutions for ...

Training for the Breach

February 06, 2017 | John McLeod

Investigating breaches can be a bit overwhelming and very intimidating for ...

Recent Attacks Demonstrate The Urgent Need For C-Suite Cybersecurity Expertise

December 12, 2016 | Chuck Brooks

Escalating cyber-attacks on corporations, infrastructure, and organizations ...

Changing Business, and Risks of the Supply Chain

September 08, 2016 | Javvad Malik

Business models have greatly evolved and changed over the years. Global, ...

Incident Response Checklists

August 10, 2016 | Denny LeCompte

Incident response checklists are an essential part of responding to security ...

2016 SANS Survey on Incident Response

June 19, 2016 | Kate Brew

AlienVault helped fund the 2016 SANS Incident Response Survey. We find that ...