Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

November Developer Roll Up

Another busy month for the team at LimaCharlie. Some of the highlights include the introduction of a new sensor type and our SOC 2 Type 2 certification. I will also take this opportunity to invite you to our first ever dev stream. Join the team at LimaCharlie for an interactive living room style discussion about all that has happened in the last year. Meet the team, learn about new features and the thinking behind them, as well as getting a glimpse of what is coming.

Looking back at the ADSelfService Plus features and enhancements from 2021

The new year is approaching, and recapping the features and enhancements ADSelfService Plus realized in 2021 is fitting. The integrated self-service password management and multi-factor authentication (MFA) solution for Active Directory and cloud applications added many exciting new features and enhancements. In 2020, the major features released by ADSelfService Plus, like MFA for VPN and conditional access, focused on tackling the security issues that arose with the shift to remote work.

Predict Cyber-attacks via digital twins

Several of the digital twin technologies out there have grown fast in only a few years. Picture establishing a virtual model of IT infrastructure where one can identify loopholes, create attack scenarios, and prevent catastrophic attacks before the system is officially put in place. Using digital twins, it's no longer a silly idea for organizations to follow. Let's get knowledge of Digital Twin technology and how it can help to assess the loopholes in your security posture.

What Does Sun Tzu Have to Do with XDR? More Than You Might Think!

Military general and philosopher Sun Tzu once led the largest armies in the world and authored The Art of War, still considered a masterpiece of tactical warfare and very relevant as we wage our battles against evolving cyberattacks. That’s because even though threat intelligence is a relatively new discipline in our cyber defense processes, it has actually been around for more than 2,500 years.

Data Protection Healthcare and Social Care | How to Store Information

The Data Protection Act is an important part of the cyber domain and legislation for anyone working in health and social care. It governs how to protect the information in health and social care. This blog post will explore the implications of the act on healthcare professionals, patients and other individuals who may have dealings with you as an organisation or individual providing care to others and the importance of protecting sensitive data in health and social care.

Low-code is driving a tectonic shift in IT - can IT and security teams enable the business while also staying secure?

In recent years, we have witnessed a tectonic shift in the way organizations develop and maintain software. As part of this shift, IT operations are quickly getting decentralized.

Zero Trust: Public and Private Sectors Facing Similar Risks

Kevin Kerr, Lead Security Principal Consultant at Trustwave, participated in a discussion on Zero Trust with Steve Riley, Field CTO at Netskope during SASE Week 2021. The importance of Zero Trust is derived from how it functions. Instead of focusing on protecting a physical network, a Zero Trust network works by focusing on securing the resources that reside on or have access to the network such as data, identities, and services.

Creating a Cloud Security Stack for AWS Control Tower

Co-authored by Andy Horwitz and Yuri Duchovny Today, Netskope released a new cloud security solution to help AWS customers provide consistent security across all their AWS accounts leveraging AWS Control Tower. Many AWS Customers follow the multi-account framework as a best practice to isolate teams and workloads on the cloud. Often this may introduce overhead in terms of policy configuration and management.