Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

LimaCharlie

How MSSPs can overcome challenging and uncertain economic times

Running an MSSP is no easy task. In this roundtable discussion, we are going to be exploring how MSSPs can thrive in these uncertain economic times. Security will continue to grow despite the economic conditions but client companies are going to become more price sensitive and this is going to impact MSSPs that compete on margin.

Cybersecurity Expert Interview: Dr. Joseph Burt- Miller Jr.

Introduce yourself and tell us what you do for your day job. My name is Dr. Joseph J. Burt-Miller Jr. I currently serve as Assistant Project Manager at the Department of Homeland Security. One of my main duties is handling the risk management piece for projects, so interacting with contractors and our risk owners, ensures that our risks are tracked and mitigated. Anything that needs immediate attention I bring to my leadership, my project manager and program manager, etc.

Developer Roll Up: August 2022

Another month rolls off the calendar with lots of exciting things happening at LimaCharlie. The team was on the ground at Blue Team Con which was a great experience. The most exciting thing this month would have to be the addition of Matt Bromerly to the team. Matt is joining LimaCharlie as a Lead Solutions Engineer/Developer Relations. He has deep experience and a passion for working with organizations to solve their cybersecurity challenges.

Cybersecurity Expert Interview: Jonathan Haas

Introduce yourself and tell us what you and your company does. My name's Jonathan Haas, I'm the CEO and co-founder of ThreatKey. ThreatKey is a security posture management platform. Essentially, what that means is we help businesses secure themselves and identify which things they should be prioritizing amongst their various business tools. Things like AWS, GCP, or SaaS product like Google workspace, Microsoft 365 65, etc.

Cybersecurity Expert Interview: Whitney Champion

My name is Whitney Champion and I'm the lead architect and one of the co-founders of Recon InfoSec. Basically I'm responsible for building and maintaining our security stack, our applications, and also our training platform: The Network Defense Range, or NDR. We're a managed security services provider, and we're based out of Austin, Texas. There are roughly 15 of us and we provide managed detection and response services and training.

CI/CD pipeline attacks: A growing threat to enterprise security

CI/CD pipeline attacks are a growing threat to enterprise security. In this article, we’ll provide an overview of CI/CD for non-developers, discuss the cybersecurity issues involved, and offer some recommendations for developers, companies, and security teams.