The Forrester Wave™: Global Managed Security Services Providers, Q3 2020
August 14, 2020 | Kate Brew
LevelBlue is ranked among the top managed security service providers in The ...
AlienApps and plug-ins combined into one framework
August 13, 2020 | Rich Langston
The heart of any detection and response solution is the ability to collect ...
Onsite Security Assessment is Best, But Can Work Remotely
August 12, 2020 | Falan Memmott
The way we shop for groceries has changed because of the unusual circumstances ...
What is endpoint protection? Endpoint security explained
August 12, 2020 | Mark Stone
This blog was written by a third party author.
How the Dark Web Can Give Organizations Actionable Insights
August 11, 2020
The dark web – and the threats that hide within – is becoming a more pressing ...
Cyber threat intelligence explained
August 10, 2020 | Tawnya Lancaster
The cybersecurity industry is increasingly producing enormous amounts of raw ...
Cybersecurity risk management explained
August 10, 2020 | Ericka Chickowski
This blog was written by a third party author
Don’t call it a SIEM – How USM Anywhere does threat detection and response differently
August 10, 2020 | Rakesh Shah
Security Information and Event Management (SIEM) solutions have been the ...
How to secure Syslog with USM Anywhere
August 06, 2020 | Chris Johnson
One of the requests we often get is how to securely forward logs to the USM ...
3 Ways to Become A Lean, Mean, Proactive Threat Hunting Machine
August 05, 2020 | Mona Ghadiri
I loved reading the blog post Threat Hunting: Taking the First Step to ...
Combat mobile phishing attacks targeting Financial Services with AI
August 05, 2020 | Mike Banic
Phishing attacks are a common attack vector for financial services ...
Stories from the SOC: Compromised account detected
August 04, 2020 | Edwardo Rodriguez
Stories from the SOC is a blog series that describes recent real-world security ...
Managed security services explained: what is an MSSP?
August 03, 2020 | Nick Cavalancia
This blog was written by a third party author
Digital signatures security explained
August 03, 2020 | Bernard Brode
This blog was written by an independent guest blogger.
Secure remote access explained
July 31, 2020 | Mark Stone
This blog was written by a third party author
How Much Risk Is Hiding in Your Organization’s Internet of Things (IoT)?
July 30, 2020
As the “internet of things,” commonly known as IoT, matures and grows every ...
Finding problems that matter
July 30, 2020 | Roger Thornton
This blog was jointly authored with Ed Amoroso. See their previous blog for ...
Wednesday Watch: Questions About Managed Security Services (MSS)? Find Answers Here…
July 29, 2020
For organizations of all kinds, the threats from cyber criminals continues to ...
Wednesday Watch: Should Organizations Be Concerned About Nation-State Cyber Attacks?
July 22, 2020
For organizations of all kinds, cybercrime is an ever-growing concern. The ...
How to Augment Your Organization’s Cybersecurity Team and Find the Right Partner for You
July 21, 2020
Cybersecurity teams are overloaded on multiple fronts with an ever-increasing ...
In hard times, solve big problems and do your best work
July 20, 2020 | Roger Thornton
This blog was jointly authored with Ed Amoroso. There’s something eerily ...
Vulnerability Scanning Explained
July 16, 2020 | Nick Cavalancia
What is vulnerability scanning? Vulnerability scanning is the process of ...
Updating Your Security Awareness Training Strategy
July 16, 2020
As the saying goes, your organization is only as secure as your weakest link. ...
3 Steps to better cybersecurity in touchless business solutions (Part 3 of 3)
July 16, 2020 | Mayleen Menez
This blog was written by an independent guest blogger
Vulnerability scanning explained
July 16, 2020 | Nick Cavalancia
This blog was written by a third party author
Wednesday Watch: A Cyber Insurer’s Perspective on Today’s Security Risk Landscape
July 15, 2020
As most of us know all too well, the world of cybersecurity moves at breakneck ...
BlueApps Roundup - Box, Cloudflare, Palo Alto Networks, Salesforce, ServiceNow, Zscaler, Checkpoint
July 15, 2020 | Rich Langston
Having a detection and response strategy and tools has long been a leading ...
Security as a Service explained
July 15, 2020 | Nick Cavalancia
This blog was written by a third party author