Suspicious behavior: OTX Indicator of Compromise - Detection & response

May 25, 2022 | Julius Charles

Stories from the SOC is a blog series that describes recent real-world security ...

Stories from the SOC - Persistent malware

May 16, 2022 | Adam Vertuca

Stories from the SOC is a blog series that describes recent real-world security ...

Stories from the SOC - Command and Control

May 09, 2022 | Robert Dean

Stories from the SOC is a blog series that describes recent real-world security ...

Stories from the SOC - Lateral movement using default accounts

April 19, 2022 | Robert Dean

Stories from the SOC is a blog series that describes recent real-world security ...

Working with MSSPs to optimize XDR

March 08, 2022 | Michael Vaughn

Businesses today have many tools in their security stack and security teams ...

XDR: Native vs. Open explained

February 14, 2022 | Belinda Streak

With the advent of extended detection and response (XDR), the security ...

Stories from the SOC - Inactive Account Exploitation

January 24, 2022 | Alex Galindo

Stories from the SOC is a blog series that describes recent real-world security ...

Stories from the SOC - Powershell, Proxyshell, Conti TTPs OH MY!

November 10, 2021 | Josh Gomez

Stories from the SOC is a blog series that describes recent real-world security ...

Introducing LevelBlue Managed Extended Detection and Response (XDR)

October 19, 2021 | Lisa Ashjian

In today’s dynamic threat landscape, having different tools to meet unique ...

Top 4 Considerations When choosing an XDR solution

September 28, 2021 | Rich Langston

Cybersecurity is a fast-moving space. In fact, it’s hard to think of a time ...

The meaning behind XDR: A beginner’s guide to extended detection and response

September 22, 2021 | Belinda Streak

Where we are In the world of threat detection and response, alert fatigue and ...

Why Extended Detection and Response (XDR) and why now?

August 04, 2021 | Tawnya Lancaster

We in cybersecurity just love new, buzzy acronyms. The latest is “XDR,” ...