The Forrester Wave: Global Managed Security Services Providers, Q3 2020

August 14, 2020 | Kate Brew

LevelBlue is ranked among the top managed security service providers in The ...

AlienApps and plug-ins combined into one framework

August 13, 2020 | Rich Langston

The heart of any detection and response solution is the ability to collect ...

Onsite Security Assessment is Best, But Can Work Remotely

August 12, 2020 | Falan Memmott

The way we shop for groceries has changed because of the unusual circumstances ...

What is endpoint protection? Endpoint security explained

August 12, 2020 | Mark Stone

This blog was written by a third party author.

How the Dark Web Can Give Organizations Actionable Insights

August 11, 2020

The dark web – and the threats that hide within – is becoming a more pressing ...

Cyber threat intelligence explained

August 10, 2020 | Tawnya Lancaster

The cybersecurity industry is increasingly producing enormous amounts of raw ...

Cybersecurity risk management explained

August 10, 2020 | Ericka Chickowski

This blog was written by a third party author

Don’t call it a SIEM – How USM Anywhere does threat detection and response differently

August 10, 2020 | Rakesh Shah

Security Information and Event Management (SIEM) solutions have been the ...

How to secure Syslog with USM Anywhere

August 06, 2020 | Chris Johnson

One of the requests we often get is how to securely forward logs to the USM ...

3 Ways to Become A Lean, Mean, Proactive Threat Hunting Machine

August 05, 2020 | Mona Ghadiri

I loved reading the blog post Threat Hunting: Taking the First Step to ...

Combat mobile phishing attacks targeting Financial Services with AI

August 05, 2020 | Mike Banic

Phishing attacks are a common attack vector for financial services ...

Stories from the SOC: Compromised account detected

August 04, 2020 | Edwardo Rodriguez

Stories from the SOC is a blog series that describes recent real-world security ...

Managed security services explained: what is an MSSP?

August 03, 2020 | Nick Cavalancia

This blog was written by a third party author

Digital signatures security explained

August 03, 2020 | Bernard Brode

This blog was written by an independent guest blogger.

Secure remote access explained

July 31, 2020 | Mark Stone

This blog was written by a third party author

How Much Risk Is Hiding in Your Organization’s Internet of Things (IoT)?

July 30, 2020

As the “internet of things,” commonly known as IoT, matures and grows every ...

Finding problems that matter

July 30, 2020 | Roger Thornton

This blog was jointly authored with Ed Amoroso. See their previous blog for ...

Wednesday Watch: Questions About Managed Security Services (MSS)? Find Answers Here…

July 29, 2020

For organizations of all kinds, the threats from cyber criminals continues to ...

Wednesday Watch: Should Organizations Be Concerned About Nation-State Cyber Attacks?

July 22, 2020

For organizations of all kinds, cybercrime is an ever-growing concern. The ...

How to Augment Your Organization’s Cybersecurity Team and Find the Right Partner for You

July 21, 2020

Cybersecurity teams are overloaded on multiple fronts with an ever-increasing ...

In hard times, solve big problems and do your best work

July 20, 2020 | Roger Thornton

This blog was jointly authored with Ed Amoroso. There’s something eerily ...

Vulnerability Scanning Explained

July 16, 2020 | Nick Cavalancia

What is vulnerability scanning? Vulnerability scanning is the process of ...

Updating Your Security Awareness Training Strategy

July 16, 2020

As the saying goes, your organization is only as secure as your weakest link. ...

3 Steps to better cybersecurity in touchless business solutions (Part 3 of 3)

July 16, 2020 | Mayleen Menez

This blog was written by an independent guest blogger

Vulnerability scanning explained

July 16, 2020 | Nick Cavalancia

This blog was written by a third party author

Wednesday Watch: A Cyber Insurer’s Perspective on Today’s Security Risk Landscape

July 15, 2020

As most of us know all too well, the world of cybersecurity moves at breakneck ...

BlueApps Roundup - Box, Cloudflare, Palo Alto Networks, Salesforce, ServiceNow, Zscaler, Checkpoint

July 15, 2020 | Rich Langston

Having a detection and response strategy and tools has long been a leading ...

Security as a Service explained

July 15, 2020 | Nick Cavalancia

This blog was written by a third party author