Reducing Alert Fatigue by Streamlining SOC Processes
October 07, 2024 | Katrina Thompson
Stay Informed
Sign up to receive the latest security news and trends straight to your inbox from LevelBlue.
Toward a more resilient SOC: the power of machine learning
June 21, 2023 | Belinda Streak
A way to manage too much data To protect the business, security teams need to ...
The role of AI in healthcare: Revolutionizing the healthcare industry
May 01, 2023 | M. Upasana
The content of this post is solely the responsibility of the author. LevelBlue ...
Why Extended Detection and Response (XDR) and why now?
August 04, 2021 | Tawnya Lancaster
We in cybersecurity just love new, buzzy acronyms. The latest is “XDR,” ...
Improved third party security with rapid assessment tools
July 27, 2021 | Louise Le Goff
The CISO of a large state agency shared with me the automated tools he used to ...
AI everywhere: How AI is being applied in 4 different fields
June 30, 2021 | Devin Morrissey
Image Source: Pexels
How data poisoning is used to trick fraud detection algorithms on ecommerce sites
June 21, 2021 | Theodoros Karasavvas
This blog was written by an independent guest blogger.
The 5 most crucial Cybersecurity updates for businesses in 2021
April 26, 2021 | Devin Partida
This blog was written by an independent guest blogger.
FUD-free analysis: Natural language processing (NLP)
January 21, 2020 | Joe Gray
If you follow me on Twitter, you may already be aware. Still, if you don’t (I ...
All about security analytics
March 18, 2019 | Kim Crawley
With or without a security operations center, and whether your network is on ...
How AI and Machine Learning are Changing Cybersecurity
December 15, 2018 | Chuck Brooks
Recently, the Defense Advanced Research Project Agency (DARPA) announced a ...
Hackers Using AI? An Increase in the FUD Factor
January 29, 2018 | Jason Kichen
It’s hard to envision hackers, whether skiddies, APTs, or anything in between, ...
Machine Learning Myths
September 18, 2017 | Mike Duffy
“Machine learning” is the new “it” buzzword in security. As a result, it’s ...