Suspicious behavior: OTX Indicator of Compromise - Detection & response
May 25, 2022 | Julius Charles
Stories from the SOC is a blog series that describes recent real-world security ...
Stories from the SOC - Persistent malware
May 16, 2022 | Adam Vertuca
Stories from the SOC is a blog series that describes recent real-world security ...
Stories from the SOC - Command and Control
May 09, 2022 | Robert Dean
Stories from the SOC is a blog series that describes recent real-world security ...
Stories from the SOC - Lateral movement using default accounts
April 19, 2022 | Robert Dean
Stories from the SOC is a blog series that describes recent real-world security ...
Working with MSSPs to optimize XDR
March 08, 2022 | Michael Vaughn
Businesses today have many tools in their security stack and security teams ...
XDR: Native vs. Open explained
February 14, 2022 | Belinda Streak
With the advent of extended detection and response (XDR), the security ...
Stories from the SOC - Inactive Account Exploitation
January 24, 2022 | Alex Galindo
Stories from the SOC is a blog series that describes recent real-world security ...
Stories from the SOC - Powershell, Proxyshell, Conti TTPs OH MY!
November 10, 2021 | Josh Gomez
Stories from the SOC is a blog series that describes recent real-world security ...
Introducing LevelBlue Managed Extended Detection and Response (XDR)
October 19, 2021 | Lisa Ashjian
In today’s dynamic threat landscape, having different tools to meet unique ...
Top 4 Considerations When choosing an XDR solution
September 28, 2021 | Rich Langston
Cybersecurity is a fast-moving space. In fact, it’s hard to think of a time ...
The meaning behind XDR: A beginner’s guide to extended detection and response
September 22, 2021 | Belinda Streak
Where we are In the world of threat detection and response, alert fatigue and ...
Why Extended Detection and Response (XDR) and why now?
August 04, 2021 | Tawnya Lancaster
We in cybersecurity just love new, buzzy acronyms. The latest is “XDR,” ...