Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Purple Teaming Okta Detections with LimaCharlie

Security expert Ken Westin hosted a technical session focused on advancing your Identity Security Posture Management (ISPM) capabilities with LimaCharlie. Through practical demonstrations, you'll learn: Leave this session with actionable insights for strengthening your identity security monitoring program.

Automating Browser Extension Security with LimaCharlie and Secure Annex

As browsers increasingly become users' primary operating systems for accessing analytics, financial, and other sensitive data, their security requirements are evolving. While browser developers invest significant resources in secure development, one vulnerability remains difficult to address: browser extensions. Browser companies must maintain extension flexibility to allow users to customize their web browsing experience.

Operationalizing TLSH for Detection with David Burkett

David Burkett, Cloud Security Researcher at Corelight, joined Defender Fridays to discuss operationalizing TLSH for detection which enables fast, scalable, and resilient identification of near-duplicate files, helping to uncover malware variants and similar threats with minimal false positives.

#188 - The MSSP Alert 2024 Pricing Benchmark Report with Sharon Florentine from CyberRisk Alliance

On this episode of The Cybersecurity Defenders Podcast we speak with Sharon Florentine, Senior Managing Editor at CyberRisk Alliance, about the MSSP Alert 2024 Pricing Benchmark Report. Sharon is a master technology storyteller and editor with over two decades of experience in shaping the way we understand and engage with technology. Sharon's career spans an impressive range of platforms, from books and print magazines to podcasts, live events, and digital media. She's covered everything from AI and cybersecurity to career development and diversity in tech.

Introducing CelesTLSH: Advanced Malware Detection with Fuzzy Hashing

We are excited to announce the integration of the CelesTLSH Malware Scanner into the LimaCharlie ecosystem. Developed by Magonia Research, CelesTLSH enhances your security operations by scanning files collected via the BinLib extension. It identifies known malware and threat actor tools through advanced fuzzy hashing techniques.

#187 - Automation in MSSP Operations with David Burkett, Cloud Security Researcher at Corelight

On this episode of The Cybersecurity Defenders Podcast we talk about automation in MSSP operations with David Burkett, Cloud Security Researcher at Core light. David has deep expertise in cloud threat detection and automation. Over the course of his career, David has built and optimized three different Cyber Security Operations Centers for MSSP and MDR providers, demonstrating his unparalleled skill in scaling security operations through automation and efficient processes.

Create Instant, Scalable, and Cost-Effective Value for MSSP Customers

This blog was originally published on MSSP Alert on November 20, 2024. Imagine being able to offer your customers instant value for selecting your MSSP over others. This sounds like a tricky proposition, given that organizations seeking managed security solutions can be extremely diverse. What could a medical institution need that would also benefit an energy company? Where do the needs of a tech startup and a dairy farm intersect?

#177 - Intel Chat: Supply-Chain Firewall, Scattered Spider, Linux malware & another NTLM exploit

In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel. The live stream mentioned in this episode for the Cybersecurity Cares Fundraising efforts for Becky’s Fund took place on December 19, 2024.