Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Announcing Our UI Update and In-product Dashboards

At LimaCharlie meeting our customer’s needs is a top priority. This means were usually working on new features, extensions, and expanded functionality for the platform. However, we have also received feedback regarding our UI and general suggestions for improving user experience. That is why we’re pleased to announce that we’ve just released a new UI update. You can use the new UI by clicking on the gear icon in the top right corner of the screen.

Fed Gov Today: Breaking Security Barriers to Government Modernization

Jim Coyle, U.S. Public Sector CTO at Lookout, discusses the challenges government agencies face in embracing mobility, cloud security, and AI. While modernization efforts are progressing, many organizations still struggle with security concerns, particularly around mobile devices, which are increasingly targeted by cyber threats. Coyle highlights the need for stronger public-private partnerships to accelerate secure digital transformation. He also shares the importance of understanding data sovereignty in AI and improving endpoint security to protect classified and unclassified information.

Massive DDoS on X: Dark Storm or Cyber Fog?

Earlier this week, users of the X (formerly Twitter) social network were either unable to access the platform or experienced service degradation somehow. On March 10, 2025, reports emerged of users worldwide being unable to log in, post, or view content. This incident was later attributed to a large-scale distributed denial-of-service (DDoS) attack targeting X's infrastructure.

The Purdue Enterprise Reference Architecture: Strengthening IoT and OT Security in Industrial Environments

In an era where Industrial Internet of Things (IIoT) and Operational Technology (OT) are converging, securing industrial environments has never been more critical. The Purdue Enterprise Reference Architecture (PERA), a model that has been a foundation for network segmentation and security for over three decades, remains a pivotal framework for safeguarding industrial systems in this complex digital age.

NIST SP 800-171 Rev 2 vs Rev 3: What's The Difference?

Government cybersecurity and information security frameworks are a constant work in progress. Many different frameworks draw their requirements from the National Institute of Standards and Technology, and one of the most important documents for cybersecurity is NIST Special Publication 800-171: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations.

Security Week teaser and Lisbon's waves of entropy

We’re back with new episodes in 2025, kicking off this week with a Security Week teaser. Host João Tomé is joined by Michael Tremante, Sr. Director of Product Management, to discuss what to expect from our first innovation week of the year, starting next week. They also explore the security landscape in 2025 and the importance of simplicity.

Eliminate Security Complexity on Pi Day | WatchGuard Technologies

Cyber threats don’t stop, just like Pi (π). That doesn’t mean your security should be stuck in an endless loop of updates, patching, and stress. WatchGuard delivers real security - tailored to you, eliminating complexity, and keeping you ahead of threats. This Pi Day (3.14), let’s celebrate security that works.