LevelBlue Blog
Tag: Regulatory Compliance
Data Reveals Unaligned Leadership: Business, IT, and Cybersecurity Don’t Share Priorities - But They Should!
August 7, 2024 | Theresa Lanowitz
In the rapidly evolving cybersecurity landscape, alignment between business priorities, IT, and cybersecurity strategies is crucial for organizational resilience. However, the 2024 LevelBlue Executive Accelerator, based on the 2024 LevelBlue Futures Report, reveals a significant disconnect among technology-related C-suite executives—CIOs, CTOs, and CISOs. This disconnect highlights how their divergent roles and priorities can lead to misalignment with broader business objectives.… Read more →
Regulatory Compliance and Ransomware Preparedness
July 1, 2024 | Josh Breaker-Rolfe
Ransomware attacks are a huge problem: in the past five years alone, they have brought about a state of emergency across vast swathes of the United States, threatened to topple the Costa Rican government, and brought Portugal's largest media conglomerate to its knees. And ransomware attackers show no signs of slowing down: last year, roughly one-third of all data… Read more →
Keeping Cybersecurity Regulations Top of Mind for Generative AI Use
September 6, 2023 | Devin Partida
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. Can businesses stay compliant with security regulations while using generative AI? It’s an important question to consider as more businesses begin implementing this… Read more →
What is File Integrity Monitoring and Why You Need It
February 27, 2019 | Sacha Dawes
The news is rife with stories of successful attacks against servers, point-of-sale (POS) systems, IoT devices and more where an attacker has gained access to an organization’s IT assets and changed or inserted new files and data to do something malicious. Just a search on malware highlights a seemingly-endless list of variants including the recent exposure of NSA-backed… Read more →