LevelBlue Blog
Tag: Iam
Self-sovereign identities: Whose life is it anyway?
February 1, 2024 | Steve Prentice
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. In 2023, the unfettered expansion and acceleration of internet technologies crashed headlong into the generative abilities of AI, leaving people struggling with the concept of what… Read more →
Best Practices For Companies Implementing IAM
January 10, 2023 | Farwa Sajjad
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. Identity and access management has emerged as an essential security element for organizations. A study reveals that 80% of global IT decision-makers have already adopted or are… Read more →
Three easy steps to dramatically improve your AWS security posture: Step 1, set up IAM properly
January 4, 2023 | Chris Maes
Have you ever heard the saying that the greatest benefit of the cloud is that limitless resources can be spun-up with just a few clicks of the mouse? If so, you would be best served by forgetting that saying altogether. Just because cloud resources can be spun-up with a few clicks of the mouse does not mean that… Read more →
11 Cybersecurity investments you can make right now
October 27, 2022 | Anas Baig
This blog was written by an independent guest blogger. The average cost of a data breach will continue to rise, which means companies need to start planning accordingly. To protect your business, you need to invest in cybersecurity. Here are 11 areas you should focus on. Cyber insurance Cyber insurance is designed to protect businesses from the financial repercussions of a… Read more →
How analyzing employee behavior can improve your cybersecurity posture
September 30, 2022 | Shigraf Aijaz
This blog was written by an independent guest blogger. Despite the ongoing rise in social engineering attacks, the idea that cybersecurity is only about technology manifests within most of our minds. Organizations often neglect human behavior's impact on their cybersecurity postures. Instead, they spend lavishly on endpoint security tools, threat hunting programs, and building incident response plans. Admittedly, these… Read more →