Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How To Track Employee AI Usage

Artificial intelligence (AI) is quickly transforming the workplace as we know it. According to a recent Forbes article, many organizations will move from experimenting with Generative AI to making it a fundamental part of their business—transforming essential functions from human resources to customer service and supply chain management. Data analysis that used to take hours can now be done in minutes with ChatGPT.

How to Setup SAML SSO + SCIM for Jira with KeyCloak as IdP

This video tutorial guides you through setting up the miniOrange SAML+SCIM Bundle for Jira with Keycloak as your Identity Provider (IdP). Learn how to integrate Jira with Keycloak to enable secure Single Sign-On (SSO) and automate user provisioning between the two platforms. With this integration, you can: Allow users to access Jira using their Keycloak credentials Automatically provision, update, and deactivate users from Keycloak in Jira.

How to Prevent Cross-Site Scripting (XSS) on Payment Pages

Many teams believe that cross-site scripting, or XSS, is a problem of the past. Modern frameworks promise built-in protections, and developers often assume the browser will handle the rest. The reasoning sounds logical: if React auto-encodes output, XSS can’t happen. However, XSS prevention doesn’t work on assumptions; it works on visibility. We’ve learned that XSS prevention is about maintaining continuous control over the browser environment where your application runs.

The Business Case for Investing in AppSec Tools

Relying on disjointed, manual security processes creates bottlenecks that delay software releases and increase business risk. As development accelerates, security teams struggle to keep pace, leading to a rise in security debt and a greater likelihood of breaches. Investing in the right AppSec tools is no longer a technical decision; it is a strategic business imperative.

Extending Zero Trust to Every Endpoint

Learn how to evolve your Zero Trust strategy with expert insights from LevelBlue. As organizations grow and face new compliance challenges, securing access to data and applications is more critical than ever. In this Zero Trust webinar, our cybersecurity experts explore how to build a unified, resilient Zero Trust framework using managed security services that combine endpoint security and network security.