Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ahead of the Curve: Tanium Guardian AI Dashboard - Tanium Tech Talks #156

AI is everywhere - but where is it in your IT environment? In this episode, we discuss how Tanium Guardian's AI Visibility Dashboard gives you visibility into AI tooling. Learn how we detect MCP servers, local model managers, OpenClaw installations, and local model files Understand the risks associated with AI tools and managing exposure, performance risks, and compliance considerations.

LevelBlue Named a Finalist for the 2026 SC Media Awards for Best Managed Security Service

LevelBlue is excited to announce that SC Media has selected us as a finalist for the 2026 SC Media Awards under the Best Managed Security Service category. For 29 years, the SC Awards have recognized companies and individuals driving innovation in cybersecurity and those working every day to defend our digital world and advance the practice of information security.

Defeating the deepfake: stopping laptop farms and insider threats

Trust is the most expensive vulnerability in modern security architecture. In recent years, the security industry has pivoted toward a zero trust model for networks — assuming breach and verifying every request. Yet when it comes to the people behind those requests, we often default back to implicit trust. We trust that the person on the Zoom call is who they say they are. We trust that the documents uploaded to an HR portal are genuine. That trust is now being weaponized at an unprecedented scale.

Always-on detections: eliminating the WAF "log versus block" trade-off

Traditional Web Application Firewalls typically require extensive, manual tuning of their rules before they can safely block malicious traffic. When a new application is deployed, security teams usually begin in a logging-only mode, sifting through logs to gradually assess which rules are safe for blocking mode. This process is designed to minimize false positives without affecting legitimate traffic. It’s manual, slow and error-prone.

Why Infostealers Are Central to Third-Party Breaches: A Look at the Top Malware Targeting Your Vendors

When threat actors compromise your vendors, they are rarely aiming for a single, isolated win. They are looking for leverage. Every third party represents a potential force multiplier: a trusted connection, a shared platform, a pathway into multiple downstream environments. We recently looked at the vulnerabilities that are most commonly being used against vendors, but vulnerabilities alone don’t tell the full story.