Blueliv
Blog & Resources

Blog

Blueliv sponsors RootedCON 2017

  This year we once again sponsored RootedCON, Madrid’s annual computer security conference. Our Professional Services team shared their highlights in this blog post. Security professionals from all over the world attended to represent some of the most influential organizations in the cyber security sector. And it wasn’t only about speakers and delegates, it was also a brilliant opportunity for industry experts to network amongst their peers and share knowledge. Following a growing number of requests to widen the […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Try the Blueliv Cyber Threat Intelligence Platform for free

  Do you want to improve your external threat visibility? The Blueliv Cyber Threat Intelligence Platform 14-day free trial is now available. During your trial Blueliv will look for compromised information belonging to your company (based on the domain of the email you used to register). Use the Blueliv dashboard to view results and use the data to empower your SOC team to more efficiently mitigate threats targeting your organization. 5 reasons to start your free trial today Get […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

RSA Conference USA 2017: one week on

Year after year, RSA continues to hold the title as the biggest annual IT security event. This year marked Blueliv’s third year of attendance at the renowned San Francisco conference to meet and connect with our industry peers. More exhibitors, more attendees The number of exhibitors increases each year and 2017 was no exception. More innovation, more competition. Some are even debating whether the cyber security market is becoming saturated with solution providers, in excess of the actual demand […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Platform release 3.13: enhanced data gathering

Our latest platform release (3.13) features three fantastic updates to increase customers’ cyber threat visibility and enable users to gather even more threat data than before. And of course, Blueliv’s Product Dev team have been busy implementing some user-interface enhancements. Here’s a little bit about what’s new. Brand mentions We understand how important it is to track brand mentions online. The more organizations expand their digital reach, the more relevant their digital footprint becomes. Our Media Tracker module now […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Cyber threat intel drives change in the finance sector

Our latest use case documents the implementation of targeted cyber threat intelligence to reduce the level of cyber risk challenging a major bank, and discusses common challenges relevant to financial institutions everywhere. Financial sector use case Industry: Financial Services Challenge: Inefficient management of multiple generic threat intelligence sources This use case focuses on a large global bank facing a common challenge. The bank will be referred to as RS1 for the purposes of anonymity. The use case explains how RS1 reduced […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Data Privacy Day 2017 – be #privacyaware

Data has become the most valuable asset to brands big and small, but protecting it is increasingly difficult. It’s been estimated that there will be 30.7 billion connected devices by 2020. Personal data is the fuel that makes this cool new technology work. And with new technology, our attack surface continues to expand. So, our data is more accessible and the value this information is the highest it’s ever been. Unfortunately, the bad guys know this better than anyone. […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Don’t miss Blueliv at RSA Conference USA 2017

DETECT AND REACT TO CYBER THREATS FASTER: advanced business threat search and monitoring “Most of the important things in the world have been accomplished by people who have kept on trying when there seemed to be no hope at all.” Dale Carnegie With the words of Dale Carnegie in mind, the team here at Blueliv continue to champion collaboration in the global fight against cybercrime as we countdown to RSA Conference USA 2017. Visit us at booth #S1745, South […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

iSOC24 Morning Session: Cyber Threat Intelligence 24 Jan 2017

We’re pleased to share that we’ll be joining the agenda as a strategic vendor for iSOC24’s next ‘be in control’ morning session dedicated to Cyber Threat Intelligence in Culemborg, Netherlands. This event is aimed at organizations currently investigating this subject. The morning session will include iSOC24’s insights and experiences in the Cyber Threat Intelligence field, beginning with the exploration phase up to the actual deployment. The team will explain the differences between information and intelligence, which sources are reliable, […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

2016 in review: Blueliv’s proudest moments

2016 has been an eventful year in every sense across the globe. Before we take a well-deserved break over the holidays and prepare ourselves for an even busier 2017, let’s take a look back at seven key milestones Blueliv has accomplished this year. We’d like to wish our customers and partners safe, secure and happy holidays. Here’s to a successful 2017! Blueliv team expands to >60 This year has marked a significant transition for Blueliv as we evolve from […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Why Vawtrak v2 could be the next major banking Trojan

Neira Jones, Non-Executive Director Cognosec, Partner Global Cyber Alliance and industry influencer shares her thoughts on the evolution of banking Trojans and digital transformation in the finance sector in our new white paper. Think more like a criminal… This came to my attention through the excellent report published by cyber threat intelligence provider Blueliv, and made me think that whilst we all have seen the statistics related to the various types malware and the innovative methods criminals use to get […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone