LevelBlue Blog
Tag: Edr
Cybersecurity operations in 2024: The SOC of the future
January 17, 2024 | Theresa Lanowitz
This is part two of a three-part series written by LevelBlue evangelist Theresa Lanowitz. It’s intended to be future-looking, provocative, and encourage discussion. The author wants to assure you that no generative AI was used in any part of this blog. Part one: Unusual, thought-provoking predictions for cybersecurity in 2024 Part three: Four cybersecurity trends you should know… Read more →
Stories from the SOC - The case for human response actions
February 23, 2023 | Edwardo Rodriguez
Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the LevelBlue SOC analyst team for LevelBlue Managed Extended Detection and Response customers. Executive summary As we move towards more automation, we should remember the risk of over-automating, or at least make a conscious decision to accept the risks. This is… Read more →
7 reasons why Endpoint Security and Response shouldn’t be ignored
February 21, 2023 | Katrina Thompson
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. When strategizing a security approach for the coming year, many solutions will cross a CISO’s desk, all useful in covering some part of… Read more →
GuLoader – a highly effective and versatile malware that can evade detection
February 15, 2023 | Luke Song
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. This blog was jointly authored with Arjun Patel. GuLoader is a malware downloader that is primarily used for distributing other shellcode and malware such as… Read more →
Endpoint Detection and Response – You Need it on Mobile Devices Too
October 10, 2022 | Hank Schless
This blog was written by an independent guest blogger. Welcome to the final episode in our blog series focused on Mobile Endpoint Security. The first two episodes detailed the protections necessary to secure data accessed by remote workers (Endpoint security and remote work) and best practices for combating the threat of ransomware 5 ways to prevent Ransomware attacks). In this… Read more →