Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ThreatQ Cyber Forum Recap: Expert Insights on Risk-Based Vulnerability Management

The discipline of vulnerability management has been around for decades and the way we assess risk, based on severity and likelihood of exploitation, has remained fairly constant. However, there are challenges in how this formula is usually applied that narrow our perspective on risk and our mitigation strategies.

Reviewing Remote Work Security: Best Practices

Remote work has shifted the mindset away from the old style of employment, showing up to the office every day. However, it seems that more businesses are starting to grab back some of the traditional practice of showing up to the office. The timing is probably helping, as the northern hemisphere is starting to warm up, making the commute to an office slightly more enjoyable. However, as we move towards an in-office presence, it may make us more relaxed about some of the rules of remote working.

Harnessing the Managed Services Opportunity: Netskope Unveils New Managed Service Provider (MSP) Program

In today’s service economy, enterprise and mid-market organizations alike are increasingly favoring a managed services model for their advanced technology solutions. To address the heightened demand and evolving procurement trends, we are pleased to announce the new Netskope Managed Service Provider (MSP) Program.

A game of nations - How nation-states prepare for cyber threats with Locked Shields

This blog is the first post of a two-part series. Part 1 talks about the concept of a nation-state and then provides a high-level overview of Locked Shields — the world's largest cybersecurity exercise — and its increasingly important role in promoting cyber warfare readiness for NATO member states and partners. Part 1 also outlines the steps taken by nations to prepare for a cyber warfare exercise.

Tines Technical Advisory Board (TAB) Takeaways with Pete: part one

I’m Peter Wrenn, my friends call me Pete! I have the pleasure of being the moderator of the Tines Technical Advisory Board (TAB) which is held quarterly. In it, some of Tines’s power users engage in conversations around product innovations, industry trends, and ways we can push the Tines vision forward — automation for the whole team. Well, that’s the benefit to our customers and Tines.

Explore the ONE Security Platform for MSPs

As cyberattacks and the overall threat landscape grow more complex, managed service providers (MSPs) need to evolve. As an MSP, you must be capable of protecting customers from attacks targeting networks, devices, and users. Finding ways to protect your customers’ expanding threat surface is one thing, but doing so without compromising on operational efficiency or profitability is another. At times this can feel like an insurmountable task.

6 Reasons Cyber Security Is Important for SEO

In today’s digital landscape, the importance of cyber security cannot be overstated. With the ever-increasing frequency of cyber threats, protecting sensitive data has become a priority for individuals and businesses. In search engine optimization (SEO), cyber security is also important. Google and users are more likely to trust websites that provide measures against common cyber security threats. Therefore, website owners with proper security systems can expect higher Google rankings.

New look, who dis? LimaCharlie's brand evolution.

Today we are launching an evolution of the LimaCharlie brand as part of our refreshed identity. The intention of this post is to simply let you know about the change, so you won’t be surprised when things coming from us look a little different. Similar to our introduction of the SecOps Cloud Platform, this evolution of our logo and brand is not driven by change for the sake of change.

Seven Idaho Colleges Suffer Breaches: Students and Staff Impacted

Idaho is home to many popular universities that serve millions of students annually. Seven of the schools in Idaho were recently impacted by a data breach that resulted in a substantial amount of lost information. The vulnerable parties state that they're secure now, but a significant amount of data has already been lost to the attackers. Learn more about the stolen data and the schools involved in this attack.