Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Exciting Announcement: Introducing Agentless Proxmox Backup and Recovery in BDRSuite!

We’re excited to announce the availability Proxmox backup and recovery, designed to meet the evolving needs of businesses utilizing Proxmox VE. With BDRSuite, organizations can now seamlessly integrate robust backup and data protection capabilities into their Proxmox environments, ensuring comprehensive data protection a their virtualized Proxmox infrastructure. In this blog, we’ll delve into the recently launched Proxmox backup solution offered by BDRSuite.

Active Directory Security Best Practices Guide

One of your organization’s most essential components is Active Directory (AD). Here we’ll look at some basic yet best practices for securing Active Directory infrastructure, backed up by statistics. As, in today’s digital landscape, cyber threats lurk around every corner, protecting your organization’s Active Directory infrastructure is more than a priority—it’s a requirement. Let’s not delay any longer – straight into the list we go!

An Offensive Security Perspective on Hacking the Cloud: Five AWS and Azure Cloud Security Threats to Focus On

According to Gartner, the global market for cloud infrastructure services increased by 30% in 2022, exceeding $100 billion for the first time. AWS and Azure account for almost two-thirds of this figure. While many organizations benefit from these platforms, the popularity of the cloud can also present significant security challenges.

EP 52 - Built to Last: CyberArk's 25-Year Innovation Evolution w/ Founder and Executive Chairman Udi Mokady

In this episode of the Trust Issues podcast, host David Puner interviews CyberArk Founder and Executive Chairman Udi Mokady on the occasion of the company’s 25th anniversary. They discuss that milestone and reflect on CyberArk’s growth to becoming the global leader in identity security and the ever-evolving threat landscape – and how the company has scaled to meet it. Udi shares his insights on the company’s culture, values, philosophies and lessons he has learned.

Business Email Compromise Attacks: How To Prevent & Recover

Imagine receiving a work email from your finance department asking about an overdue invoice. You notice it has a few extra typos and uses strange language, so disregarding it as junk. What you don’t know is that your very busy coworker receives the same email at the same time. Because they’re more distracted than normal, they respond, unknowingly aiding with a business email compromise (BEC) attack.

Wild Wisdom: What Technology Learns from the Natural World

The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. As a high school student interested in exploring the connection between technology and nature, I was curious to find out how the natural world inspires modern technological advances. My research journey started with some basic Google searches and reading through articles on biomimicry.

Empowering Governance in AI-Driven Citizen Development

AI is at the heart of technology democratization. As AI tools become more accessible, individuals and organizations have begun to utilize AI copilots to build their own apps, automations and increase productivity in their jobs. This transformation has come to be known as the next evolution of low-code and no-code development. This development promises to accelerate innovation, enhance productivity, and solve complex problems more efficiently than ever before.

Maximizing Network Performance: Strategies for Ensuring Connectivity in High-Density Wi-Fi Environments

The demand for uninterrupted online access is at an all-time high, especially in crowded areas with high user density. This article explores how to solve issues related to 2.4 GHz Wi-Fi, and implementing practical strategies for ensuring robust connectivity in high-density environments.