Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New Spotlight Report on Healthcare Identifies the Need for a Culture of Cybersecurity

Cybersecurity is a business requirement. Taking a holistic view of cybersecurity as part of the business means that risk, budget, and innovation can achieve balance. In a global survey of 220 healthcare organizations the prevailing wisdom shows that 43% effectively align business risk appetite with cybersecurity risk management, 43% allocate cybersecurity budget to every project from the beginning, and 55% believe they can risk more with innovation because they take an adaptive approach to cybersecurity.

What Is Cloud Security and How Can It Benefit Your Business?

Implementing cloud security policies and technologies has seen sustained growth in recent years. However, despite the widespread adoption of cloud-based solutions, many companies have yet to fully recognize the critical importance of cloud security or still find themselves wondering: what is cloud security and why should it matter to their business? Migrating to the cloud provides organizations with the agility to move faster and more efficiently.

Network Security vs. Endpoint Security: Key Differences and Best Practices

When it comes to cybersecurity, there are many different systems to consider. But before focusing on any one of them, it’s important to start with a basic premise: when building a comprehensive cybersecurity strategy, implement multiple layers of security. This is known as a defense-in-depth strategy. A clear example is: network security vs. endpoint security. Endpoint protection secures individual devices, while network security safeguards the entire network.

One Year of LevelBlue: Milestones, Momentum, and a Vision for the Future

This month marks an exciting milestone – LevelBlue’s first anniversary. One year ago, we launched with a clear mission: to simplify cybersecurity and help organizations achieve meaningful, outcome-driven security in an increasingly complex threat landscape. Now, a year in, I’m incredibly proud of how far we’ve come.

Hunting Malware with MSHTA and CyberChef: A Deep Dive into Obfuscation in Malicious Scripts and Credential Theft

Recently, our team came across an alert involving mshta.exe, a native Windows tool that attackers commonly exploit for malicious purposes. MSHTA (Microsoft HTML Application Host) is a well-known LOLBin (Living-Off-The-Land Binary). This means it is a legitimate system tool that can be abused and can blend in with normal activity. MSHTA can execute remote HTML applications or JavaScript content directly from a URL.

DDoS Protection: Insurance Policy or Proactive Defense?

Historically, smaller organizations or those outside highly targeted industries for distributed-denial-of-service (DDoS) attacks have thought of DDoS protection more akin to an insurance policy than proactive cyber defense, i.e. we’ll put some reactive processes in place “in case we get hit,” but not much more.

How to Use the LevelBlue DDoS Defense Portal | Video Overview

Get up to speed with the essentials of the LevelBlue DDoS Defense Portal in this video tutorial. Learn how to analyze network traffic, monitor threats, and customize your security settings—all in one place. Whether you're managing alerts, viewing mitigations, or generating reports, this step-by-step guide ensures you're prepared. In this video, you’ll learn how to.

Understanding LevelBlue DDoS Alert Emails & Investigation Process | What to Expect

This video explains how LevelBlue DDoS Defense Service alert emails work and provides a clear overview of the investigation and escalation process triggered by high severity alerts. You’ll learn: When and why DDoS alert emails are sent The role of the LevelBlue Threat Management Team How investigations determine malicious vs. legitimate traffic Differences between pre-authorized and manual mitigation What each type of alert email means.

How to Manage DDoS Contacts in the LevelBlue Portal | Add, Edit & Notify Admins

Learn how to add and manage contacts in the LevelBlue DDoS Defense Portal, including how to ensure the right users receive DDoS mitigation alerts and notifications. This step-by-step guide walks company administrators through: Accessing the DDoS Defense Portal Adding contacts with Business Direct IDs Enabling email alerts for DDoS mitigation events Managing contact updates to keep your incident response team informed.