Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

LevelBlue Security Colony: A Practical Cybersecurity Resource Hub for CISOs

Few cybersecurity knowledge repositories are as broad, deep, or widely respected as LevelBlue Security Colony. Industry analyst firm IDC has recognized the value of Security Colony, noting that clients and other organizations interested in understanding their cybersecurity posture download thousands of resources each month, many of which are available at no cost.

LevelBlue and Fortra Partner to Deliver Next-Generation Managed Detection and Response

To counter sophisticated modern threats, LevelBlue is partnering with Fortra to integrate Fortra’s best-in-class solutions with LevelBlue’s elite managed services, delivering a comprehensive security offering. As part of this long-term partnership, LevelBlue will acquire the managed services of Fortra’s Alert Logic Managed Detection and Response (MDR), Extended Detection and Response (XDR), and Web Application Firewall (WAF) solutions.

Par for the Course: Why Golf Facilities Are Prime Targets for Cyberattacks

Golf can be an incredibly frustrating game to play. The great Winston Churchill described golf as "a game whose aim is to hit a very small ball into an even smaller hole, with weapons singularly ill-designed for the purpose.” Interestingly, cybersecurity professionals face the exact opposite problem.

LevelBlue Named a Major Player in the IDC MarketScape: Worldwide Managed SSE Services 2025

LevelBlue has been recognized as a Major Player in the IDC MarketScape: Worldwide Managed Security Service Edge Services 2025 Vendor Assessment (IDC September 2025). The IDC MarketScape noted that, “Enterprises seeking a managed SSE service with multivendor flexibility and strong MDR integration should consider LevelBlue. Midmarket clients looking for cost-effective managed SSE options may also benefit from LevelBlue's tiered model.”

8 Little-Known Facts About Managed Detection and Response (MDR)

Managed Detection and Response (MDR) is a security service that has become a cornerstone of modern cybersecurity strategies. It’s designed to provide 24/7 threat monitoring, detection, and response capabilities, especially for organizations that lack the resources for an in-house security operations center (SOC). But while many have heard of MDR, there are still some common misconceptions and little-known facts about this powerful service.

The AI Authorization Revolution: Why "Who Can Do What" Is the New Security Battleground

Remember when security was simple? Users had roles. Roles had permissions. Done. Those were the days when your biggest worry was whether someone from marketing accidentally got admin access to the finance system. Welcome to 2026, where that simplicity is dead.

Identity & Beyond: 2026 Incident Response Predictions

In 2026, incident response (IR) will continue its shift away from traditional malware-centric investigations toward identity-driven intrusions, abuse of trusted cloud services, and low-signal, high-impact activity that blends seamlessly into normal business operations. Rather than relying on technical exploits, threat actors are prioritizing legitimate access, persistence, and operational efficiency, enabling them to evade users, security controls, and automated detection.

Secure What's Next: How a World-Class MSSP Builds Trust and Scale for 2026

Jesse Emerson, Chief Product Officer at LevelBlue, the world’s largest pure-play Managed Security Service Provider (MSSP), recently sat down to answer a few questions about what makes an MSSP a valuable client resource and how he sees the MSSP’s role changing in the coming year.

When AI Becomes the Insider Threat

Remember that annoying ‘paperclip’ in Microsoft Word 97? The one that was always trying to help you…Fast forward nearly 30 years and we now have AI. In the race to adopt artificial intelligence, businesses are embedding AI systems into their daily operations, streamlining workflows, enhancing productivity, and centralizing knowledge. But what happens when that very system becomes an attacker’s most valuable asset?