Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

LimaCharlie

Better Together: Integrating Microsoft with LimaCharlie

When securing your own, or your customers’ environments, the power of integration goes far beyond data. It unites platforms, tools, and services to achieve stronger, more efficient security operations. LimaCharlie’s SecOps Cloud Platform, coupled with Microsoft’s robust security ecosystem, can help you deliver detection and response capabilities across Microsoft’s ecosystem. It helps you build stronger security for a fraction of the cost of traditional approaches.

Threat Hunting in macOS with the SecOps Cloud Platform

The second most popular OS in today’s business environment, macOS, is often neglected in cybersecurity discussions. This is likely due to Windows OS holding a dominant share (72.1%) of the global workstation market and Linux (4.03%) running critical parts of IT infrastructure. This often leaves macOS excluded from the conversation.

Ransomware as a Business with Ken Westin from LimaCharlie

Ken Westin, Senior Solutions Engineer at LimaCharlie, joined us for Defender Fridays to discuss Ransomware as a Business. Join us every Friday as we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry.

#157 - Low noise threat detection with Joshua Neil, Founder at Alpha Level

On this episode of The Cybersecurity Defenders Podcast we talk about low noise threat detection with Joshua Neil, Founder at Alpha Level. Josh is a seasoned expert with over 20 years of experience in developing data-driven solutions to security challenges faced by both the U.S. Government and industry at large. With a deep understanding of enterprise security, they are focused on the fact that perimeter defenses alone aren't enough to prevent attackers from breaching systems.

Threat Hunting for macOS, Part Two

In part 1 of our Threat Hunting for macOS webinar series we explored basic use cases for utilizing macOS Unified Logging (MUL) and system telemetry to uncover suspicious behavior. Building upon this foundation, in part two we explore more intricate use cases and tap into third-party logs to uncover sophisticated attack TTPs.