Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How Are SMEs Approaching AI?

Have you heard about AI yet? Just kidding. We know you have. Recently, AI’s popularity has skyrocketed among businesses and consumers alike. This surge was driven by a combination of technological advancements (e.g., machine learning, natural language processing, and data analytics) with an increase in tool accessibility and user-friendliness.

Threat Intelligence's Role in Cybersecurity

In April of 2024, the customers of data analytics company Sisense were warned by the Cybersecurity and Infrastructure Security Agency (CISA) to reset their credentials and be on the lookout for suspicious activity. The decision that there was an immediate threat, based on data and observation, as well as the subsequent analysis that supply-chain attacks are increasing, is threat intelligence in action.

10 modern Node.js runtime features to start using in 2024

The server-side JavaScript runtime scene has been packed with innovations, such as Bun making strides with compatible Node.js APIs and the Node.js runtime featuring a rich standard library and runtime capabilities. As we enter into 2024, this article is a good opportunity to stay abreast of the latest features and functionalities offered by the Node.js runtime.

5 Things Holding Back Your Vulnerability Management Program and How to Overcome Them Step by Step

Welcome to our latest vulnerability management webinar, hosted by Scott Kuffer and Gene Bandy. In this session, Scott and Gene dive deep into the complexities and challenges faced by organizations in managing vulnerabilities and what you can do about it. Key Topics Covered: Why Watch This Webinar? Don't forget to like, comment, and subscribe for more in-depth webinars and expert discussions on cybersecurity and vulnerability management!

Advanced Threat Protection for Apps Built Using AI

AI has undoubtedly revolutionized various industries, enhancing both efficiency and innovation through low-code and no-code platforms. Yet, this ease of development brings with it an increased burden of security. As business users and developers rapidly build applications, automations, and bots using AI, the complexity and volume of these creations amplify potential security vulnerabilities.

How Workstreet hits efficiency targets with Vanta

Established in 2019 with headquarters in Colorado, Workstreet stands out as a premier Managed Security Service Provider (MSSP) dedicated to supporting hyper-growth technology businesses with security and compliance needs. Workstreet approaches its vCISO and security services as strategic accelerators for client growth, helping clients establish, maintain, and demonstrate their security and privacy functions. ‍

Volatile Data Acquisition on Linux Systems Using fmem

The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. Memory forensics is a critical aspect of digital forensics, allowing investigators to analyze the volatile memory of a system to uncover evidence of malicious activity, detect hidden malware, and reconstruct system events.

The Art of Cyber Deception: How To Get Inside The Mind of A Hacker with Rob Black

**Explore Revolutionary Cybersecurity Tactics on Razorwire with Rob Black** Tune in to this week’s episode of Razorwire where host Jim engages with Rob Black, a former military strategist turned cybersecurity innovator. Rob’s extensive experience, from computer game design to defusing IEDs, provides a unique perspective through which we can understand adversary psychology in cybersecurity. For more information or to ask questions, email podcast@razorthorn.com. Visit for personalised cybersecurity consultation.