6 Tips for Supply Chain Risk Management in 2022

January 31, 2022 | Henry Ward

Forrester recently predicted that in 2022, 60% of security incidents would ...

Stories from the SOC - WannaCry malware

January 31, 2022 | Ian Schlesinger

Stories from the SOC is a blog series that describes recent real-world security ...

How Data Privacy Has Evolved in the Age of the Breach

January 28, 2022 | Luke Kenny

As Data Privacy Day once again rolls around, we can look back at some healthy ...

M&A Trending In Cybersecurity Industry Vertical For 2022

January 28, 2022 | Chuck Brooks

This blog was written by an independent guest blogger.

DevSecOps plan process

January 27, 2022 | Keith Thomas

In the DevOps and DevSecOps Introduction, What is DevOps, we reviewed how our ...

Stories from the SOC - Inactive Account Exploitation

January 24, 2022 | Alex Galindo

Stories from the SOC is a blog series that describes recent real-world security ...

NFTs - Protecting the investment

January 20, 2022 | Karoline Gore

This blog was written by an independent guest blogger.

Log4j: How a Single Vulnerability Can Affect Multiple Systems

January 19, 2022 | Rob Horne

There are truisms that span history. One truism is that a single mistake can ...

Exploring influences on SSC grades for insurance companies

January 19, 2022 | Nahla Davies

This blog was written by an independent guest blogger.

When It comes to Cybersecurity - An ounce of prevention

January 18, 2022 | Tim Hazzard

Benjamin Franklin advised fire-threatened Philadelphians in 1736 that, “An ...

Russia’s FSB Takes Down REvil Cyber Gang in an Unprecedented Series of Raids

January 14, 2022 | Ziv Mador

Reuters reported on Friday that the Russian Federal Security Service (FSB) and ...

How to Outplay the Ransomware Playbook

January 13, 2022 | Darren Van Booven

Organizations across industries are increasingly concerned about their ...

Is Fighting Cybercrime a Losing Battle for Today's CISO?

January 12, 2022 | Theresa Lanowitz

At times, the quest to stay on top of web application security can seem futile. ...

Introducing next-generation firewall from Palo Alto Networks to support 5G-enabled IoT, OT and IT use cases

January 11, 2022 | Lisa Ashjian

Enterprises know they need defenses integrated into each aspect of their ...

FIN7 Sends BadUSB Devices to U.S. Businesses as Part of Targeted Ransomware Campaign

January 11, 2022 | Karl Sigler

First reported by The Record, the FBI has issued a new security Flash Alert ...

Multi-Factor is incomplete without backup codes

January 10, 2022 | Bob Covello

This blog was written by an independent guest blogger.

CISO's Corner: The Four Best Cybersecurity Investments You Can Make During the Cyber Talent Shortage

January 06, 2022 | David Bishop

The need for strong cybersecurity has reached critical mass. Seventy-six ...

Endangered data in online transactions and how to safeguard company information

January 06, 2022 | Samantha Clark

This blog was written by an independent guest blogger.

LevelBlue teams up with Cisco to create new managed SASE offering

January 05, 2022 | Will Eborall

Whether organizations call it digital transformation or just using technology ...

Breaking Out of the Vicious Cycle of Ransomware Attacks

January 04, 2022 | Ed Williams

Ransomware has quickly become one of the most prevalent cyber threats facing ...

Technology's contributions toward safety in healthcare

January 04, 2022 | Devin Morrissey

This blog was written by an independent guest blogger.

Manual and semi-automated testing for Insecure Direct Object References (IDORs) using Burp Suite

December 29, 2021 | Irfan Shakeel

This blog was written by an independent guest blogger.

A Year of Threat Intel: Looking Back at SpiderLabs Research in 2021

December 28, 2021

2021 will go down in the record book as another critical year in the ...

Top 10 LevelBlue Blogs Published in 2021

December 22, 2021 | Kate Brew

I enjoy being editor and managing this blog so much, I thought I'd share some ...

The Year in Review: Looking Back at the Top LevelBlue Blog Posts

December 21, 2021

The most popular LevelBlue blog posts in 2021 were indicative of the year ...

How to evolve your organization into a data-centric security architecture

December 21, 2021 | Theodoros Karasavvas

This blog was written by an independent guest blogger.

Has the pandemic increased the burnout rate in the Cybersecurity profession?

December 17, 2021 | Bob Covello

This blog was written by an independent guest blogger.

Preparedness, Speed and Communication are the Cornerstones of a Solid Ransomware Defense

December 16, 2021 | Darren Van Booven

Ransomware attackers today have the technical skill and tools to analyze a ...