Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Security Incident and Event Management.

Cyber Resilience 2025 with Theresa Lanowitz | LevelBlue Futures Report

What does cyber resilience look like in 2025? Join Theresa Lanowitz, Chief Evangelist at LevelBlue, as she unpacks the findings of the 2025 LevelBlue Futures Report: Cyber Resilience and Business Impact. In this exclusive video, Theresa shares expert insights into the evolving threat landscape, the rise of AI-readiness, software supply chain visibility, and the five key traits of a cyber resilient organization.

Telemetry: What It Is and How it Enables Security

If you have ever built a LEGO set, then you have a general idea of how telemetry works. Telemetry starts with individual data points, just like your LEGO build starts with a box of bricks. In complex IT environments, your security telemetry is spread across different technologies and monitoring tools, just like in a large build your LEGO bricks come separated into smaller, individually numbered bags. In both cases, the individual bricks or data points aren’t special.

Build, test, and scale detections as code with Datadog Cloud SIEM

Security teams often struggle to keep up with rapidly evolving threats, especially when they have to manually manage detection rules. Without automation or version control, it's difficult to maintain consistency across environments, track changes, or deploy updates quickly. Datadog Cloud SIEM supports detection as code, a structured approach to authoring, testing, deploying, and managing detection rules using code and infrastructure-as-code tools like Terraform.

Cybersecurity GTM Strategy in Action | Tawnya Lancaster, LevelBlue

How do you align cybersecurity services with what the market really needs? Tawnya Lancaster, Director of Product Marketing and Market Research at LevelBlue, shares how her team transforms global market insights into impactful go-to-market strategies. Learn about the rollout of flexible new service tiers across managed detection & response, vulnerability management, and network/cloud security.

Cybersecurity Innovation at LevelBlue | Rakesh Shah on What's Next

What does the future of managed security services look like? Rakesh Shah, VP of Product Management at LevelBlue, breaks down the roadmap ahead in this forward-looking video. Discover how LevelBlue is simplifying security offerings, modernizing service delivery, and introducing a clear “good-better-best” tiering model to give customers more choice and control.

Automate Cloud SIEM investigations with Bits AI Security Analyst

Security analysts face unprecedented challenges in today's cloud landscape. Security operations center (SOC) teams are chronically understaffed, and cybersecurity threats are skyrocketing—further intensified by GenAI-driven attacks. High false positive rates add to this strain, fueling alert fatigue and delaying the detection of real threats. These hurdles make it harder for analysts to keep pace, which ultimately drives up mean time to resolution (MTTR).

6 Core Components of an Alertless SOC Security Teams Should Know

The traditional approach to managing security operations centers (SOCs) is straining the mental and physical reserves of even the most skilled security analysts—while also failing to provide the protection organizations need against today’s threats. Analysts are left to respond to a never-ending stream of alerts, resulting in an overwhelming, reactive cycle that stifles proactive investigation and threat hunting.

MDR vs SIEM: Which is Right for Your Organization?

The decision to buy a Security Information and Event Management (SIEM) product or outsource to a Managed Detection and Response (MDR) depends on a number of factors, including the size of your organization, the complexity of your IT infrastructure, and your overall security needs. Before we get into the main discussion, let’s step back and define what we are talking about so everyone is on the same page.

How Falcon Next-Gen SIEM Protects Enterprises from VMware vCenter Attacks

Internet-facing assets are targeted for many reasons, such as to establish persistence, evade defensive capabilities, and access sensitive networks. According to the search engine Shodan, approximately 1,600 VMware vSphere instances are directly accessible via the internet, representing a significant attack surface.