Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New Spotlight Report on Healthcare Identifies the Need for a Culture of Cybersecurity

Cybersecurity is a business requirement. Taking a holistic view of cybersecurity as part of the business means that risk, budget, and innovation can achieve balance. In a global survey of 220 healthcare organizations the prevailing wisdom shows that 43% effectively align business risk appetite with cybersecurity risk management, 43% allocate cybersecurity budget to every project from the beginning, and 55% believe they can risk more with innovation because they take an adaptive approach to cybersecurity.

What Is Cloud Security and How Can It Benefit Your Business?

Implementing cloud security policies and technologies has seen sustained growth in recent years. However, despite the widespread adoption of cloud-based solutions, many companies have yet to fully recognize the critical importance of cloud security or still find themselves wondering: what is cloud security and why should it matter to their business? Migrating to the cloud provides organizations with the agility to move faster and more efficiently.

Network Security vs. Endpoint Security: Key Differences and Best Practices

When it comes to cybersecurity, there are many different systems to consider. But before focusing on any one of them, it’s important to start with a basic premise: when building a comprehensive cybersecurity strategy, implement multiple layers of security. This is known as a defense-in-depth strategy. A clear example is: network security vs. endpoint security. Endpoint protection secures individual devices, while network security safeguards the entire network.

One Year of LevelBlue: Milestones, Momentum, and a Vision for the Future

This month marks an exciting milestone – LevelBlue’s first anniversary. One year ago, we launched with a clear mission: to simplify cybersecurity and help organizations achieve meaningful, outcome-driven security in an increasingly complex threat landscape. Now, a year in, I’m incredibly proud of how far we’ve come.

Hunting Malware with MSHTA and CyberChef: A Deep Dive into Obfuscation in Malicious Scripts and Credential Theft

Recently, our team came across an alert involving mshta.exe, a native Windows tool that attackers commonly exploit for malicious purposes. MSHTA (Microsoft HTML Application Host) is a well-known LOLBin (Living-Off-The-Land Binary). This means it is a legitimate system tool that can be abused and can blend in with normal activity. MSHTA can execute remote HTML applications or JavaScript content directly from a URL.

DDoS Protection: Insurance Policy or Proactive Defense?

Historically, smaller organizations or those outside highly targeted industries for distributed-denial-of-service (DDoS) attacks have thought of DDoS protection more akin to an insurance policy than proactive cyber defense, i.e. we’ll put some reactive processes in place “in case we get hit,” but not much more.

What Is Generative AI? Business Guide & Security Tips

In today’s rapidly evolving digital landscape, generative AI has emerged as a transformative force. From automating workflows to enhancing creative processes, businesses across industries are leveraging this technology to stay competitive. However, with innovation comes risk. As generative AI becomes more accessible, cybercriminals are also finding ways to exploit it.

Ransomware Response Plan: What Steps Schools and Libraries Should Take After an Attack

In Part 1 of this blog series The Ransomware Threat: Preparing Schools and Libraries for Ransomware Attacks, we discussed creating a pre-incident plan that includes a backup process, asset management, identity and access management, risk-based vulnerability management, and security awareness training to minimize the risk of ransomware attacks.