Founder, Patrick Kelley, speaking at TechAdvantage 2024!

We are excited to announce that Patrick Kelley, one of the esteemed founders of Léargas Security, will be a featured speaker at the upcoming TechAdvantage 2024 Conference. This prestigious event is scheduled to take place in San Antonio, Texas, on Tuesday, March 5th, 2024. Patrick's talk, titled "Where to Focus [...]

Read More

The Dynamic Duo of Cybersecurity

BLOG The Dynamic Duo of Cybersecurity: Automation & Orchestration, Amplified by Generative AI As cyber threats grow in sophistication and volume, the terms “automation” and “orchestration” have emerged as the linchpins of contemporary cybersecurity strategy, particularly in the deployment and optimization of Extended Detection and Response (XDR) platforms. In this [...]

Read More

A New Era of Streamlined Cyber Incident Reporting

BLOG Strengthening the Fort: A New Era of Streamlined Cyber Incident Reporting In the ever-evolving landscape of cybersecurity, the necessity for clear channels of communication and collaboration cannot be overstated. That’s why the recent announcement from the US Department of Homeland Security (DHS) is a crucial step forward for the [...]

Read More

Léargas XDR – Defending America’s Critical Infrastructure

BLOG Léargas XDR – Defending America’s Critical Infrastructure In 2014, the pressing need for a comprehensive cybersecurity solution to the vulnerabilities faced by nearly 900 electric cooperatives was acknowledged by the U.S. Department of Energy (DOE). Understanding that the integration of Extended Detection and Response (XDR) solutions in electric cooperatives [...]

Read More

The Crucial Role of Zeek-based Platforms in IT and OT Environments

BLOG The Crucial Role of Zeek-based Platforms like Leargas Security XDR in IT and OT Environments The fusion of Information Technology (IT) and Operational Technology (OT) ecosystems is increasingly becoming integral in today’s enterprises. As the cyber threat landscape continues to evolve, posing intricate and sophisticated attacks, organizations are turning [...]

Read More

The Perils of Threat Intelligence Feed Poisoning: The Importance of Proper Curation and Validation of Artifacts

BLOG The Perils of Threat Intelligence Feed Poisoning: The Importance of Proper Curation and Validation of Artifacts As organizations adapt to the ever-changing cyber threat landscape, they increasingly depend on threat intelligence feeds to remain informed about the latest malicious activities and safeguard their digital assets. These feeds provide real-time, [...]

Read More