LevelBlue Blog
Tag: Machine Learning
Reducing Alert Fatigue by Streamlining SOC Processes
October 7, 2024 | Katrina Thompson
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. We wanted to know what was going on within our vast networks; modern tools have made it possible for us to know too much. Some data… Read more →
Toward a more resilient SOC: the power of machine learning
June 21, 2023 | Belinda Streak
A way to manage too much data To protect the business, security teams need to be able to detect and respond to threats fast. The problem is the average organization generates massive amounts of data every day. Information floods into the Security Operations Center (SOC) from network tools, security tools, cloud services, threat intelligence feeds, and other sources. Reviewing and… Read more →
The role of AI in healthcare: Revolutionizing the healthcare industry
May 1, 2023 | M. Upasana
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. Introduction Artificial Intelligence (AI) is the mimicry of certain aspects of human behaviour such as language processing and decision-making using Large Language Models (LLMs) and… Read more →
Why Extended Detection and Response (XDR) and why now?
August 4, 2021 | Tawnya Lancaster
We in cybersecurity just love new, buzzy acronyms. The latest is “XDR,” otherwise known as extended detection and response. No doubt, you’ve already read an article, watched a webinar, or listened to a podcast on XDR. Jon Olstik and Dave Gruber of cybersecurity research firm, ESG, wrote several articles in the summer of 2020 in which they… Read more →
Improved third party security with rapid assessment tools
July 27, 2021 | Louise Le Goff
The CISO of a large state agency shared with me the automated tools he used to mine intelligence about his IT suppliers, and their sub-suppliers and interconnections by way of vetting for security posture. He truly recognized the threat of third parties long before the SolarWinds hack. His due diligence sparked inspiration for this blog. Can a business… Read more →