Always-on detections: eliminating the WAF "log versus block" trade-off

Traditional Web Application Firewalls typically require extensive, manual tuning of their rules before they can safely block malicious traffic. When a new application is deployed, security teams usually begin in a logging-only mode, sifting through logs to gradually assess which rules are safe for blocking mode. This process is designed to minimize false positives without affecting legitimate traffic. It’s manual, slow and error-prone.

The 89% Problem: How LLMs Are Resurrecting the "Dormant Majority" of Open Source

AI coding assistants are quietly resurrecting millions of abandoned open source packages. For the last decade, developers relied on a simple heuristic for open source security: Prevalence \= Trust. If a package was downloaded millions of times a week (lodash, react, requests), we assumed it was "safe enough" because thousands of eyes were on it. If it was obscure, we approached with caution.

Defeating the deepfake: stopping laptop farms and insider threats

Trust is the most expensive vulnerability in modern security architecture. In recent years, the security industry has pivoted toward a zero trust model for networks — assuming breach and verifying every request. Yet when it comes to the people behind those requests, we often default back to implicit trust. We trust that the person on the Zoom call is who they say they are. We trust that the documents uploaded to an HR portal are genuine. That trust is now being weaponized at an unprecedented scale.

NIS2 Documentation Requirements: Policies You Must Have

NIS2 documentation requirements form the essential foundation of regulatory compliance — defining the documented controls that underpin NIS2 audit readiness and demonstrable cybersecurity governance. Yet in 2026, the landscape is shifting: documentation alone is no longer enough.

LevelBlue Named a Finalist for the 2026 SC Media Awards for Best Managed Security Service

LevelBlue is excited to announce that SC Media has selected us as a finalist for the 2026 SC Media Awards under the Best Managed Security Service category. For 29 years, the SC Awards have recognized companies and individuals driving innovation in cybersecurity and those working every day to defend our digital world and advance the practice of information security.

Introducing LimaCharlie Ticketing: Built for Detection, not Adapted from IT

Sr. Technical Content Strategist Most ticketing tools SecOps teams use today were never built for security. Jira, ServiceNow, PagerDuty are all capable platforms but ultimately adapted for a purpose outside of their design. The result is brittle workflows, manual overhead, and systems that require constant care to stay aligned with the natural flow of detection and response. LimaCharlie Ticketing fills that gap.