Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Expanding Horizons: LevelBlue Enhances MSSP Offerings with Government Cloud Support

In today's digital landscape, cybersecurity is paramount, especially for government agencies entrusted with safeguarding sensitive data and critical infrastructure. Recognizing this need, LevelBlue is proud to announce the availability of its latest offering: support for Managed Security Service Providers (MSSPs) in the Government Cloud.

Wild Wisdom: What Technology Learns from the Natural World

The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. As a high school student interested in exploring the connection between technology and nature, I was curious to find out how the natural world inspires modern technological advances. My research journey started with some basic Google searches and reading through articles on biomimicry.

2024 Cyber Resilience Research Reveals a Complex Terrain

New data helps business leaders understand how and why to prioritize resilience. In the ever-evolving landscape of digital innovation, businesses find themselves at the intersection of progress and peril. The data reveals that the tradeoffs are not just dramatic, but they also put the organization at significant risk. One of the primary obstacles is the disconnect between senior executives and cybersecurity priorities.

Introducing LevelBlue: Elevating Business Confidence By Simplifying Security

Today is a monumental day for the cybersecurity industry. Live from RSA Conference 2024, I’m excited to introduce LevelBlue – a joint venture with AT&T and WillJam Ventures, to form a new, standalone managed security services business. You can read more about the news here. In 2022, I founded my private equity firm, WillJam Ventures, and since then, we’ve held an exceptional track record of investing in and operating world-class cybersecurity businesses.

Stories from the SOC - Combating "Security Alert" Scams

The “Security Alert” scam is a prevalent tech-support fraud that threatens both Windows and Apple users. It exploits the trust of users by masquerading as an official support site, using fake pop-up warnings to lure users into dialing scam phone numbers by conveying a sense of urgency. The ultimate goal is gaining remote access to the user’s system and pilfering personal data to extort money.

Volatile Data Acquisition from Live Linux Systems: Part I

In the domain of digital forensics, volatile data assumes a paramount role, characterized by its ephemeral nature. Analogous to fleeting whispers in a bustling city, volatile data in Linux systems resides transiently within the Random Access Memory (RAM), encapsulating critical system configurations, active network connections, running processes, and traces of user activities. Once a Linux machine powers down, this ephemeral reservoir of information dissipates swiftly, rendering it irretrievable.

Enhancing Financial Security Through Behavioral Biometrics

The evolution of tech necessitates stronger cybersecurity. Financial information is appealing to hackers trying to steal identities and commit fraud. These bad actors are evolving with tech to figure out ways to bypass the increasingly robust cybersecurity measures.

Understanding how Rationality, Deterrence Theory, and Indeterminism Influence Cybercrime.

Understanding the factors influencing cybercriminal behavior is essential for developing effective cybercrime prevention strategies. Rationality plays a significant role in shaping criminal decisions, particularly through the lens of the rational actor model and deterrence theory.