Microsoft Entra ID: What security teams need to know

Microsoft Entra ID controls identity across Microsoft 365, Azure, and SaaS, making it a primary target for credential theft, OAuth abuse, and session hijacking. Defenders need phishing-resistant MFA, hardened PIM, tuned Conditional Access, and SIEM-integrated identity signals. Native tools do not cover on-prem AD threats, long-term retention, or cross-platform correlation, so hybrid organizations need complementary tooling.

Protect your OCI resources with Datadog Cloud Security

Organizations adopt multi-cloud architectures for many reasons, including compliance requirements, business strategy, and resiliency. Regardless of the cloud provider, the security challenges remain the same: Identify the most critical risks, prioritize them with business context, and remediate them before they are exploited by a bad actor.

Persistent XSS/RCE using WebSockets in Storybook's dev server

Aikido Attack, our AI pentest product, found a WebSocket hijacking vulnerability in Storybook's dev server that can lead to persistent XSS, remote code execution, and, in the worst case, supply chain compromise. Storybook's WebSocket server has no authentication or access control, so if the dev server is publicly accessible, an attacker can exploit this without any user interaction at all. In the more common local setup, a developer just has to visit the wrong website while Storybook is running.

Cybersecurity as Competitive Advantage: Why Clients Will Pay More for Secure Law Firms

Here’s a number that should change how law firms think about IT security budgets: 37% of clients are willing to pay more for firms with strong cybersecurity measures. That’s not a soft preference – it’s a purchasing decision. According to the 2025 Integris Report on Law Firms and Cybersecurity, clients are actively factoring security into their choice of legal counsel.

Why Determinism Is Still a Necessity in Security

Deterministic security tools, at this point, have become such a regular part of security that, for a long time, we weren’t questioning the alternatives. With AI becoming a core component of security with probabilistic models, it’s time to revisit determinism and get clear about what it’s needed for. Otherwise, why shouldn’t we just start replacing everything with AI?

The Resilience Retainer: Incident Response Retainers, Reimagined

Too many organizations today still rely on "legacy" retainer models. These traditional contracts are often rigid, opaque, and reactive, and designed for a world that no longer exists. That’s why LevelBlue is proud to announce the Resilience Retainer. This is a modern, flexible approach built on our experience of handling more than 9,000 cyber incidents worldwide. This up-to-date approach is a necessity, given the long-lasting impact an incident can have.

Navigating AI in IT: Balancing Innovation, Privacy, and Expertise

If you work in IT right now, your feed is probably split between AI hype, AI fear, and confused memes about both. Depending on who you ask, AI is either coming for your job, coming for everyone’s job, or going to “free you up to do more strategic work”—which somehow always looks like doing the same work, just faster, with fewer people. Some of that fear is legitimate.

The Security Debt Crisis: Why 82% of Organizations Are Struggling

Modern software development has a fundamental problem: we are writing code faster than we can secure it. This creates security debt, a quantifiable backlog of unaddressed vulnerabilities that lingers for over a year. Much like financial debt, it compounds interest over time, but the currency is risk. Despite increased investment in security tools, this backlog is growing, not shrinking. With security debt reaching a critical mass in 2026, organizations must shift their strategy.