Reducing Alert Fatigue by Streamlining SOC Processes

October 07, 2024 | Katrina Thompson

Toward a more resilient SOC: the power of machine learning

June 21, 2023 | Belinda Streak

A way to manage too much data To protect the business, security teams need to ...

The role of AI in healthcare: Revolutionizing the healthcare industry

May 01, 2023 | M. Upasana

The content of this post is solely the responsibility of the author. LevelBlue ...

Why Extended Detection and Response (XDR) and why now?

August 04, 2021 | Tawnya Lancaster

We in cybersecurity just love new, buzzy acronyms. The latest is “XDR,” ...

Improved third party security with rapid assessment tools    

July 27, 2021 | Louise Le Goff

The CISO of a large state agency shared with me the automated tools he used to ...

AI everywhere: How AI is being applied in 4 different fields

June 30, 2021 | Devin Morrissey

Image Source: Pexels

How data poisoning is used to trick fraud detection algorithms on ecommerce sites

June 21, 2021 | Theodoros Karasavvas

This blog was written by an independent guest blogger.

The 5 most crucial Cybersecurity updates for businesses in 2021

April 26, 2021 | Devin Partida

This blog was written by an independent guest blogger.

FUD-free analysis: Natural language processing (NLP)

January 21, 2020 | Joe Gray

If you follow me on Twitter, you may already be aware. Still, if you don’t (I ...

All about security analytics

March 18, 2019 | Kim Crawley

With or without a security operations center, and whether your network is on ...

How AI and Machine Learning are Changing Cybersecurity

December 15, 2018 | Chuck Brooks

Recently, the Defense Advanced Research Project Agency (DARPA) announced a ...

Hackers Using AI? An Increase in the FUD Factor

January 29, 2018 | Jason Kichen

It’s hard to envision hackers, whether skiddies, APTs, or anything in between, ...

Machine Learning Myths

September 18, 2017 | Mike Duffy

“Machine learning” is the new “it” buzzword in security. As a result, it’s ...