Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Overview of Teleport Zero Trust Access: Secure Infrastructure Without VPNs

In this video, we explore how Teleport Zero Trust Access replaces outdated VPNs and static credentials with a modern, identity-based approach to secure infrastructure access. See how Teleport unifies access across servers, Kubernetes, databases, and cloud environments, all powered by short-lived, certificate-based credentials that eliminate passwords, reduce risk, and streamline engineering workflows.

Best HIPAA Compliance Software by Category: Website Monitoring, GRC & Privacy

We see the same pattern across healthcare clients. The servers are locked down, databases encrypted, and GRC documentation is in order. Then we check the browser layer and find a Google Analytics pixel quietly sending appointment URLs and other PHI to third-party servers without a BAA.

Securing The Win Episode Two: Mark Hazelton

In this episode of Securing the Win, Oracle Red Bull Racing’s Chief Security Officer Mark Hazelton joins Calum Nicholas to reveal how the team protects its most valuable asset — data. From espionage scandals to modern cyber threats, Hazelton shares how F1’s fastest team stays secure in a digital world where every millisecond — and every password — counts.

Defending QUIC from acknowledgement-based DDoS attacks

On April 10th, 2025 12:10 UTC, a security researcher notified Cloudflare of two vulnerabilities (CVE-2025-4820 and CVE-2025-4821) related to QUIC packet acknowledgement (ACK) handling, through our Public Bug Bounty program. These were DDoS vulnerabilities in the quiche library, and Cloudflare services that use it. quiche is Cloudflare's open-source implementation of QUIC protocol, which is the transport protocol behind HTTP/3.

New data: Security's communication gap with leadership (cost vs. value)

Security leaders often face challenges that extend beyond the firewall: a major gap in communication between the security function and executive leadership. This misalignment can have severe consequences, including stalling deals, increasing organizational risk, and preventing security from being recognized as a key driver of business growth.

LevelBlue Named a Major Player in the IDC MarketScape: Worldwide Extended Detection and Response Software 2025 Vendor Assessment

LevelBlue was recognized as a Major Player in the IDC MarketScape: Worldwide Extended Detection and Response Software 2025 Vendor Assessment ( September 2025, IDC.) This recognition follows the analyst firm earlier this month naming Trustwave a Leader in the IDC MarketScape: APEJ Managed Detection and Response Services 2025 Vendor Assessment (doc, September 2025). LevelBlue acquired Trustwave in August 2025.

Navigating the AI Cyber Iceberg: Deepfakes Above, Zero Days Below

Agentic AI is transforming cyber threats from phishing and deepfakes into nonstop zero-day exploits and automated ransomware. Most organizations will struggle to keep pace, but the same AI power can drive autonomous defenses that ultimately shift the balance back to the defenders.