Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Different Types of Malware Explained

The internet isn’t always a safe place. Behind every click, every download, and every flashy pop-up ad, there might be something lurking that could bring down entire systems or steal sensitive information. That “something” goes by a name we’ve all heard: malware. But while the word gets used a lot, how many of us really know what it means? Or better yet, how many of us understand the different ways malware can mess with our data, our privacy, or even our businesses?

Why Zero Trust Is Essential for Effective Cybersecurity

Let’s face it—cybersecurity is no longer a game of building taller walls or thicker locks. The old rules, the ones based on the idea that threats come only from outside, just don’t hold up anymore. In today’s digital world, where employees connect from anywhere, apps live in the cloud, and attackers can sit quietly inside your systems for weeks, trust has become a loaded word.

What Is Smishing?

Text messages used to be a safe space—quick birthday wishes, delivery updates, maybe the odd emoji from a friend. But in today’s digital world, not every ping on your phone is innocent. Some are traps, carefully crafted to trick, scare, or confuse. One of the sneakiest tricks out there? Smishing. Yep, it’s a mashup of “SMS” and “phishing.” If phishing is the scam that hides behind a shady email, smishing is its text-based cousin.

LevelBlue Momentum Continues with Two Acquisitions

In late May, I wrote a blog post titled “One Year of LevelBlue: Milestones, Momentum, and a Vision for the Future.” Year one for LevelBlue was definitely a time of growth, change, and excitement! Today, I am writing to highlight LevelBlue’s continued momentum in the market through two recently announced acquisitions. On June 11, LevelBlue announced its acquisition of Aon’s Cybersecurity and IP Litigation Consulting groups, Stroz Friedberg and Elysium Digital.

Is Your Software Supply Chain a Weak Link?

Software complexity is increasing at unprecedented levels. The average software supply chain now contains artifacts from open-source repositories, internally developed code, software developed by third-parties, and commercial-off-the-shelf (COTS) software. All of this combines to run your business. The questions surrounding the software supply chain range from its visibility to its trustworthiness to the origin of the bits and bytes. The 2025 LevelBlue Data Accelerator.

How to Improve Computer Network Security for Your Business

Regardless of size or industry, all companies are exposed to potential cyber threats. Digitalization has brought countless benefits to today’s world, but as technology has evolved, so have the strategies used by cybercriminals to access and compromise company data and operations. Implementing computer network security has become a must. In recent years, cyberattacks have increased exponentially, posing a serious risk to organizational security.

AI in Endpoint Security

It’s no revelation to say that the world of connectivity has fundamentally changed since the pandemic. What may be more eye-opening, however, is how this shift has created a cybersecurity landscape more complex than ever before. Why? As companies increasingly embrace cloud computing, remote work, and BYOD (Bring Your Device) policies, endpoint security has become a critical pillar in defending against cyber threats. However, there is a challenge.

What Is an Advanced Persistent Threat (APT)?

If the term “cyber threat” alone is enough to make any company nervous, imagine a sophisticated cyberattack designed not only to infiltrate but to remain hidden within a network for extended periods. These threats are real, but they can also be countered. Let us introduce you to the infamous APTs or advanced persistent threats.

Why OCM Is Integral to AI Governance and Compliance

As organizations race to adopt artificial intelligence, many overlook a key success factor: Organizational Change Management (OCM). While AI governance and compliance frameworks provide the structure—policies, controls, and oversight, OCM addresses the human factors that brings these frameworks to life. AI governance requires more than technical controls; it demands cultural alignment, ethical awareness, and behavioral change across the enterprise. That’s where OCM becomes critical.

4 Steps to Cyber Resilience | Expert Insights from LevelBlue | Dark Reading Interview

In this exclusive Dark Reading News Desk interview, Theresa Lanowitz from LevelBlue shares four practical and powerful steps organizations can take to boost their cyber resilience. From fostering a proactive cybersecurity culture to elevating cyber discussions to the boardroom, this conversation is packed with actionable insights. Learn how to secure your software supply chain, leverage AI for defense, and stay ahead of emerging threats.