Better Together: How a Secure Email Gateway Can Help Improve Office 365 Security

January 12, 2021

Organizations of all kinds rely heavily on Office 365 to run their ...

Why cybersecurity awareness is a team sport

January 12, 2021 | Mayleen Menez

Image Source: https://us.softvire.net

Why are cybercriminals suddenly targeting maritime infrastructure?

January 11, 2021 | Nahla Davies

This blog was written by an independent guest blogger.

Into the Breach: How 2020 Became A Tipping Point for Cybersecurity

January 07, 2021

In the year 2020, the concept of cybersecurity was thrust into the spotlight in ...

What is URL filtering? Web filtering explained

January 07, 2021 | Ericka Chickowski

This blog was written by a third party author.

New Year, Same CMMC: What Your Organization Needs to Know Now

January 06, 2021

With the start of a new year, organizations hoping to do business with the U.S. ...

IoT Cybersecurity Act successfully signed into law

January 06, 2021 | Karoline Gore

This blog was written by an independent guest blogger.

What is a software-defined perimeter and how does SDP work?

January 05, 2021 | Ericka Chickowski

This blog was written by a third party author.

Calm in the COVID storm: LevelBlue

January 05, 2021 | Rupesh Chokshi

We’ve been busy at LevelBlue Cybersecurity during the pandemic. Turns out we ...

Our Top Blogs of 2020

December 30, 2020

2020 was truly a troubling year for the world – and a consequential one for the ...

Tis the season for session hijacking - Here's how to stop it

December 22, 2020 | Bernard Brode

This blog was written by an independent guest blogger.

2020 and Cybersecurity - A Perspective

December 21, 2020 | Ziv Mador

As the leader of the LevelBlue SpiderLabs global security research team, I ...

What is next gen antivirus? NGAV explained

December 18, 2020 | Ericka Chickowski

This blog was written by a third party author.

Twas the night before InfoSec

December 18, 2020 | J.R. Parsons

This blog was written by an independent guest blogger.

3 Ways to Turn Data Risk Mitigation into A Business Growth Opportunity

December 16, 2020

Organizations everywhere, across all industries, already know how important ...

2021 Cybersecurity in Healthcare

December 16, 2020 | Bindu Sundaresan

Breaches and cyberattacks are on the rise in the healthcare industry. The ...

Why application-layer encryption is essential for securing confidential data

December 15, 2020 | Theodoros Karasavvas

This blog was written by an independent guest blogger.

How secured are touchless solutions?

December 14, 2020 | Mayleen Menez

This blog was written by an independent guest blogger.

SpiderLabs – The Year in Review

December 11, 2020 | Mark Whitehead

It’s not exactly a secret that 2020 hasn’t been a year to remember fondly – to ...

How have digital transactions become safer?

December 10, 2020 | Devin Morrissey

Image Source: Andrea Piacquadio from Pexels

What is Security Orchestration Automation and Response?

December 10, 2020 | Nick Cavalancia

This blog was written by a third party author.

Discussing the Go SMS Pro Discovery

December 09, 2020

What if the messenger app that you were using was not only exposing your data ...

6 Information security predictions for 2021

December 09, 2020 | Devin Partida

This blog was written by an independent guest blogger.

Just released! Cybersecurity Insights Report: 5G and the Journey to the Edge

December 08, 2020 | Tawnya Lancaster

We are certainly in unique times, with COVID driving digital transformation at ...

Could electric vehicles present a Cybersecurity risk to the grid?

December 07, 2020 | Karoline Gore

Credit: Pexels

What is a managed firewall? Benefits, offerings explained

December 07, 2020 | Mark Stone

This blog was written by a third party author

Why You Need To Be Thinking About SD-WAN Security

December 03, 2020

If your organization hasn’t heard of a software-defined wide area network ...

Two cybersecurity hygiene actions to improve your digital life in 2021

December 03, 2020 | Chuck Brooks

This blog was written by an independent guest blogger.