🎙️ The 8th #ThreatCast Episode Is Now Live 🎙️ Join us as we dive into the challenging world of cybersecurity and discuss how to get executive buy-in for effective cybersecurity practices. Hosted by Paul O'Sullivan, UK Sales Director, this episode features insights from Jim Griffiths, Head of Information Security at Associated British Foods. With over 35 years in the field, Jim shares invaluable experiences from his journey through the military to leading cybersecurity initiatives in top organisations. Listen to the Full Podcast on: 🎧 Spotify: https://lnkd.in/eDGyJPTF 🎧 YouTube: https://lnkd.in/dSRDEnFV #CyberSecurityPodcast
Threatscape
IT Services and IT Consulting
Dublin, Dublin 3,265 followers
Cyber Security That Performs At Scale
About us
We are a pure play IT security company, which allows us to focus solely on protecting your business from cyber threats. We have offices in Dublin, London and Sheffield, but are the trusted security partner of enterprise clients with critical IT assets in over 100 countries around the world. Our mission is to create a secure and certain future for our clients. Keeping them protected so that they can go about their business is how we know we’re delivering on our promise. To do this, our expert team of engineers use their skills alongside best-in-class solutions to protect, detect and respond to the growing threat of cyberattacks. While our team has broad expertise in cyber security, we focus on endpoint protection, detection and response, cloud security, malware defence, identity protection, network and perimeter security. We offer a range of professional services, managed security services including a 24×7 managed SOC, and are one of very few specialised security companies with a dedicated Microsoft Security Practice. For a free consultation, contact us at sales@threatscape.com Join the team: www.threatscape.com/careers
- Website
-
www.threatscape.com
External link for Threatscape
- Industry
- IT Services and IT Consulting
- Company size
- 11-50 employees
- Headquarters
- Dublin, Dublin
- Type
- Privately Held
- Founded
- 2010
- Specialties
- Malware defence, Data encryption, Data loss prevention, Network access control, Cyber Security, Managed Security Services, Cloud Security, IT Security, Firewall Protection, Information security, Symantec Platinum Partner, Endpoint Management, Microsoft Security, Infosec, Endpoint Security, Ransomware, and Business Email Compromise
Locations
-
Primary
Blackthorn Road, Sandyford
Dublin, Dublin D18EY90, IE
-
1 Ropemaker Street
Citypoint
London, England, GB
-
The Balance
2 Penfold Street
Sheffield, S1 2GU, GB
Employees at Threatscape
Updates
-
🔍 Are your cybersecurity measures robust enough to detect #AiTM attacks? Ensuring your organisation can effectively identify and respond to Adversary-in-the-Middle (AiTM) attacks is crucial in today's threat landscape. Here are 5 critical steps to fortify your defences: 1️⃣ Monitoring Suspicious Login Patterns: Track logins from unusual IPs, locations, or devices to identify anomalies that may signal potential attacks. 2️⃣ Implementing Advanced Threat Detection Systems: Utilise tools like Microsoft Defender XDR to detect session cookie theft and other AiTM activities. 3️⃣ Analysing Network Traffic: Scrutinise network traffic for proxy servers or unusual routing, which could indicate intercepted communications. 4️⃣ Utilising Threat Intelligence Feeds: Block access to malicious sites by integrating up-to-date threat intelligence data. 5️⃣ Deploying Detection Tools for Phishing Toolkits and Cloned Websites: Use browser-based tools to identify AiTM toolkits and cloned phishing sites. Check out our carousel to discover all 10 steps and enhance your cybersecurity posture! Stay ahead of cyber threats by integrating these steps into your security strategy. For more insights and comprehensive solutions, connect with us at Threatscape. Let's secure the future, together. #AiTM #MicrosoftDefenderXDR #ThreatIntelligence #IncidentResponse #AdversaryInTheMiddle
-
Intune Endpoint Privilege Management (#EPM) Explained! 🎙️ In this clip of the #ThreatCast episode, Matt Call delves into 3 critical ways Intune Endpoint Privilege Management (#EPM) protects local admin: 1️⃣ User Confirmed Elevation 2️⃣ Automatic Elevation 3️⃣ Support Approved Elevation 🎧 Don't miss out on these essential insights! Watch the full episode here: https://lnkd.in/dDAWb74G #Intune #EndpointManagement
-
What Is An Adversary-in-the-Middle (AitM) Attack? An Adversary-in-the-Middle (AiTM) attack is a high-risk form of cyber attack wherein a malicious actor intercepts and manipulates communication between two parties. Despite its complexity, the tools for AiTM attacks are easily accessible, making it a potent threat for even vigilant users. Check out our most recent blog on Adversary-in-the-Middle (AiTM) attack. The blog contains the following key insights: ➡️ 4 Potential Risks of Adversary in The Middle Attacks ➡️ 10 Steps to Help Your Organisation Detect AiTM Attacks ➡️ 5 Tips to Help Protect Against AiTM Attacks https://lnkd.in/ecVtpwPp #AiTM #AdversaryInTheMiddleAttack
-
A bit like the “death and taxes” joke, exclusions are inevitable at some point for any Conditional Access administrator. Putting aside the egregious exclusions to require MFA for users who kick and scream loudly about it, you’ll have legitimate scenarios that just don’t work with an exclusion. But consider this rule for CA policy design: all exclusions should have a supplementary policy to minimise that exclusion. “Huh?” Check out this video by Ru Campbell to explore this with an example. Visit our YouTube channel To watch the full video on "Common Mistakes in Microsoft 365 Conditional Access". #ConditionalAccess #MicrosoftSecurity #ZeroTrust
-
🎙️ The 7th #ThreatCast Episode Is Now Live 🎙️ In this week’s episode of ThreatCast, Ru Campbell is joined by Matt Call, Principal Product Manager at Microsoft, who shares insight on Microsoft Intune, and his journey from consulting to product engineering, touching on the challenges associated with implementing changes across endpoints and the vulnerabilities created by over-privileged user accounts. Listen to the Full Podcast on: 🎧 Spotify: https://lnkd.in/eDGyJPTF 🎧 YouTube: https://lnkd.in/eW2Ynx6g #identitymanagement #cloudcomputing #microsoftintune #microsoftsecurity
-
Check out this episode of #ThreatCast where Merill Fernando and Ru Campbell dive deep into why conditional access is so crucial and the common mistakes you need to avoid. Listen to the podcast on: 🎧 Spotify: https://lnkd.in/eDGyJPTF 🎧 Youtube: https://lnkd.in/eSCEbs3T #conditionalaccess #ConfigurationPolicy #CompliancePolicy
-
🛡️ Cybersecurity in a World of Change 🌍 Global turmoil is everywhere - from the Middle East to Ukraine. How does this impact cybersecurity? In our latest podcast, Paul O'Sullivan and Christian. T. dive into the evolving cyber threats influenced by current events. 🔗 Watch the full episode on: 🎧 Spotify: https://lnkd.in/eDGyJPTF 🎧 Youtube: https://lnkd.in/etxuAXdW #Cybersecurity #GenerativeAI #NationStateAttacks #CIAtriad
-
Threatscape reposted this
🏆 We are thrilled to have been honoured with the 2024 Microsoft Regional Security Partner of the Year award!🏆 As five-time winners, the accolade recognises the depth of Threatscape's Microsoft expertise. From scholarship and thought leadership to partner programmes and advanced specialisations, Threatscape's Microsoft Security Practice continues to go from strength to strength. #MicrosoftSecurity #CyberSecurityAwards https://lnkd.in/esdQqDri
Threatscape Win Microsoft Regional Security Partner of the Year
https://www.threatscape.com
-
🏆 We are thrilled to have been honoured with the 2024 Microsoft Regional Security Partner of the Year award!🏆 As five-time winners, the accolade recognises the depth of Threatscape's Microsoft expertise. From scholarship and thought leadership to partner programmes and advanced specialisations, Threatscape's Microsoft Security Practice continues to go from strength to strength. #MicrosoftSecurity #CyberSecurityAwards https://lnkd.in/esdQqDri
Threatscape Win Microsoft Regional Security Partner of the Year
https://www.threatscape.com