People Know Their Data Rights, and They’re Here to Play Ball
October 01, 2024 | Katrina Thompson
Stay Informed
Sign up to receive the latest security news and trends straight to your inbox from LevelBlue.
AI - The Good, Bad, and Scary
April 01, 2024 | Matt Mui
AI and machine learning (ML) optimizes processes by making recommendations for ...
Self-sovereign identities: Whose life is it anyway?
February 01, 2024 | Steve Prentice
The content of this post is solely the responsibility of the author. LevelBlue ...
AI and Privacy - Addressing the Issues and Challenges
January 12, 2024 | Anas Baig
The content of this post is solely the responsibility of the author. LevelBlue ...
What Is Global Privacy Control (GPC), and how can it help you protect your data?
August 03, 2023 | Anas Baig
The content of this post is solely the responsibility of the author. LevelBlue ...
The ethics of biometric data use in security
February 06, 2023 | Devin Partida
The content of this post is solely the responsibility of the author. LevelBlue ...
The ethics of biometric data use in security
February 06, 2023 | Devin Partida
The content of this post is solely the responsibility of the author. LevelBlue ...
9 Ways smart devices can compromise your privacy
January 30, 2023 | Anas Baig
The content of this post is solely the responsibility of the author. LevelBlue ...
Security risks with using Free Step Tracking apps
July 21, 2022 | Danyal Zafar
This blog was written by an independent guest blogger.
How data poisoning is used to trick fraud detection algorithms on ecommerce sites
June 21, 2021 | Theodoros Karasavvas
This blog was written by an independent guest blogger.
Teaching kids internet safety tips for Zoom parties
May 17, 2021 | Devin Morrissey
This blog was written by an independent guest blogger.
Defending the client-side attack surface
May 14, 2021 | Mike Klepper
It is strange to think that not that long ago the Internet was a very different ...
Internet of Things toys are fun but raise privacy and socio-political concerns
October 21, 2020 | Karoline Gore
This blog was written by an independent guest blogger.
How SSH works: Secure Shell explained
May 21, 2020 | Kim Crawley
SSH, otherwise known as Secure Shell, is a common TCP internet protocol that ...
A new twist on “Parental consent”
January 31, 2020 | Bob Covello
An independent guest blogger wrote this blog.
Love your enemies before you destroy them
October 10, 2019 | Allie Mellen
“In the moment when I truly understand my enemy, understand him well enough to ...
Medical apps & privacy: where are we?
September 24, 2019 | Devin Morrissey
Image Source: Unsplash
Cyberbullying and cybersecurity: how are they connected?
August 21, 2019 | Devin Morrissey
Image Source: Pixabay
How to browse the internet anonymously
August 06, 2019 | Mjellma Gonzalez
Browsing privately ensures that no one spies on what you do online. Thanks to ...
Announcing the AlienVault Success Center!
March 07, 2019 | Kenneth Coe
**OSSIM is no longer in use as we focus on delivering enhanced solutions for ...
Time to Cover your Selfie Camera
October 10, 2018 | Bob Covello
I am reading an excellent book named “Cringeworthy: A Theory of Awkardness”, ...
Should the US have Its Own GDPR and Other Questions Surveyed at RSA 2018
May 22, 2018 | Kate Brew
Privacy has always had a degree of overlap with security, however, recent years ...
Cambridge Analytica Debacle -The Definition Of Breach
March 20, 2018 | Laureen Hudson
Pretty much the motto of my profession is “word choice matters.” I say it a ...
Tips To Avoid LOVE-INT On Valentine's Day
February 14, 2018 | Emily Crose
Valentine’s Day; that ever-venerated holiday celebrating human love. On a day ...
Australian Privacy Act Gets New Notification Requirements
February 05, 2018 | Sacha Dawes
With GDPR the focus of many press headlines across the world, you’d think it ...
Keystroke Logging - How it Affects the Online Privacy of Internet Users
November 21, 2017 | Kanika Sharma
Besides being a useful tool to study human-computer interaction, keystroke ...
"Prime"-ing for Amazon and Other IoT Devices
November 14, 2017 | Vineetha Paruchuri
There seems to be all sorts of advice on the Internet on how to secure IoT ...
Achieving Online Anonymity Using Tails OS
October 24, 2017 | Irfan Shakeel
Achieving anonymity while browsing the internet is the main concern for many ...