Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Threat Article to Deployed Detection Rules Automatically with @claude Code and LimaCharlie

When a new security incident surfaces, threat intelligence is only useful if you can act on it quickly. This video shows how Claude Code, combined with LimaCharlie, compresses that gap significantly.

LevelBlue Named a Top 100 Security MSP by CRN

The cybersecurity industry’s leading channel publication CRN, named LevelBlue to CRN’s Managed Service Provider (MSP) 500 list for 2026 in the Security MSP 100 category. “The companies on our 2026 MSP 500 list are redefining what exceptional managed services look like—helping organizations of every size stay agile, maximize their IT investments and scale with confidence,” said Jennifer Follett, VP of U.S. Content and Executive Editor, CRN, The Channel Company.

Why I'm Finally Ditching YUM for DNF in 2026 (And You Should, Too)

If you’ve been managing Red Hat-based systems as long as I have, yum install is likely hardcoded into your muscle memory. For decades, YUM (Yellowdog Updater, Modified) served as the backbone of RPM Linux-based distributions, getting us through countless server setups and late-night patches. But the era of YUM is officially over. With RHEL 9, Fedora, and Rocky Linux fully embracing DNF, YUM has moved from “reliable veteran” to “legacy technical debt.”

Integrating Darknet Intelligence, AI-Powered Cloud Attack Simulation & Automated Brand Protection

In the fast-paced digital underworld of February 2026, where threats morph daily amid law enforcement pressures, our intelligence team uncovers a landscape dominated by resilient darknet markets and fragmented forums fueling cybercrime. These spaces, once centralized, now scatter across encrypted channels, driving everything from credential theft to coordinated attacks that ripple through global supply chains.

CCPA consent vs opt-out: What websites Get Wrong About User Choice

If you have a consent banner, a Do Not Sell link, and a preferences database logging every opt-out, you’re CCPA compliant, right? Not really. In July 2025, Healthline Media settled with the California Attorney General for $1.55 million. That’s one of the largest CCPA fines to date. They had opt-out forms. They had GPC support. They had a preference database. Yet, after users exercised all three, investigators found that 118 cookies were still active and 82 tracking tags were still operating.

Tag Manager Security: How to Control GTM, Adobe Launch & Tealium for Privacy Compliance

Marketing needs to ship campaigns in hours. IT and engineering move in days. Tag managers live at the center of that conflict. They’re essential infrastructure, enabling marketing velocity by letting marketing teams deploy analytics, advertising pixels, and conversion tracking without IT or production bottlenecks. So campaigns launch faster, testing happens in real time, and teams optimize performance mid-campaign. But that same architecture can create compliance exposure.

Secure your desktop apps with 1Password SDKs

Bring secure, human-in-the-loop authentication directly into your desktop applications. In this video, we introduce desktop authentication support in the updated 1Password SDKs. Your desktop tools and local scripts can now securely access vault items using the native 1Password prompts users already trust. Unlike service accounts, this approach supports human-in-the-loop workflows. Users stay inside your application while explicitly approving access to their secrets.

Secure your secrets at runtime with the 1Password CLI and Environments

Stop storing secrets in.env files. In this video, we show you how to use 1Password Environments to securely inject environment variables at runtime without storing plaintext on disk. You'll see how the same 1Password Environment powers: 1Password Environments provide secure, read-only access to environment variables across development and production workflows. Key benefits: No plaintext secrets on disk Least-privilege access controls Secure runtime injection Works with CLI, SDKs, and service accounts Reliable automation across macOS and Linux.

Vulnerability Remediation: From Scan Results to Real Fixes

Vulnerability scanning is useless if you don’t fix what you find. This short breaks down a practical vulnerability remediation process to prioritize risk, patch faster, and reduce real-world exposure. Learn how security teams move from detection to closure, without months of backlog.