Insider Threats: How Businesses Can Detect and Prevent Internal Cyber Risks

April 01, 2025 | Barry O’Connell

Why Offensive Security Should Be a Top Priority, Not Just a Check-the-Box Compliance Requirement

March 04, 2025 | Lisel Newton

The following is a guest blog by Lisel Newton, Executive Director, Information ...

Why a Zero Trust Architecture Must Include Database Security

November 27, 2024

Whether the means of a cyber-attack are phishing, ransomware, advanced ...

How Microsoft E5 Security Helps Protect Healthcare and Patient Data

October 10, 2024

In the healthcare industry, safeguarding patient data is not just a regulatory ...

Defending Healthcare: LevelBlue’s Dedication to Fight Cyber Threats to Patient Safety

August 15, 2024

Hospitals face a challenging dilemma: delivering the highest quality of medical ...

Why DCAP is Essential for Modern Data Security (A Closer Look)

August 12, 2024 | Alex Vakulov

The content of this post is solely the responsibility of the author. LevelBlue ...

How LevelBlue Protects Your Databases in the Wake of Recent Healthcare Data Breaches

June 11, 2024

The recent cyberattack on Ascension Medical, Change Healthcare and several UK ...

What is data-centric security?

December 13, 2023 | Anastasios Arampatzis

The content of this post is solely the responsibility of the author. LevelBlue ...

Top 29 data security best practices for your enterprise

December 06, 2023 | Anas Baig

The content of this post is solely the responsibility of the author. LevelBlue ...