ThreatLocker Profile Banner
ThreatLocker Profile
ThreatLocker

@ThreatLocker

Followers
3K
Following
2K
Media
2K
Statuses
3K

Meet the world's leading #ZeroTrust platform. Allow what you need. Block everything else by default, including ransomware and rogue code.

Florida, USA
Joined May 2017
Don't wanna be here? Send us removal request.
@ThreatLocker
ThreatLocker
23 hours
We're in the holiday home stretch, which means cyberattacks are on the rise. many analysts say from November, to January, ransomware attacks increase by 30%. To help you weather this chilly trend, we're created a "Lights Out Checklist," which will help you harden your defenses,
Tweet card summary image
threatlocker.com
Your blueprint to keeping cyber defenses strong during holidays and long weekends
0
0
0
@ThreatLocker
ThreatLocker
3 days
New analysis from our Threat Intelligence team dives into how the Qilin RaaS group achieved initial access, lateral movement and beaconing behavior, and what your security team should watch out for. Read the full breakdown and strengthen your hunt-capabilities.
Tweet card summary image
threatlocker.com
Deep technical analysis of Qilin RaaS operations, initial access methods, C2 beaconing, and detection guidance from ThreatLocker Threat Intelligence.
0
0
0
@ThreatLocker
ThreatLocker
7 days
At ThreatLocker, growth never stops. Junior Software Developer Jenan Abas shares how constant challenges and collaboration drive her to develop both professionally and personally. Does this sound like a team you want to be part of? Check out our open positions:
0
0
0
@ThreatLocker
ThreatLocker
8 days
Vulnerable data is a problem for everyone, and federal agencies are no exception. Learn what plaintiffs allege went wrong with sensitive employee data at Office of Management and Budget and the Office of Personnel Management and find out how the ThreatLocker FedRAMP instance can
Tweet card summary image
threatlocker.com
AFGE v. OMB underscores systemic government data risk. Learn how Zero Trust and FedRAMP solutions like ThreatLocker help protect federal systems.
0
0
0
@ThreatLocker
ThreatLocker
8 days
Fact: You can secure your environment in hours and days while keeping productivity intact. How? Get all the answers you need during this live Q&A session. Register now, because we do, in fact, hit our max fast. https://t.co/XyucByyZhq #ThreatLocker #Allowlisting #infosec
Tweet card summary image
threatlocker.com
0
0
1
@ThreatLocker
ThreatLocker
9 days
Attackers exploit weak or inconsistent configurations to get into environments that should be secure. Reducing that risk requires visibility, control, and the ability to lock configurations so they can’t be changed without authorization. Register now for Thursday's webinar
0
0
0
@ThreatLocker
ThreatLocker
10 days
After attackers allegedly exploited OAuth tokens and phishing applications to compromise Salesforce systems, the ripple effect may have exposed highly sensitive data including names, dates of birth, and Social Security numbers belonging to more than one million people. Here's
0
0
0
@ThreatLocker
ThreatLocker
13 days
On Nov. 4, join us in San Francisco for a real-world hacking demonstration and learn new tactics on how to stop zero-day threats before they strike. Request your spot now as seats are very limited. https://t.co/vOmYUvm3bJ #ThreatLocker #cybersecurity #ZeroTrust #infosec
0
0
1
@ThreatLocker
ThreatLocker
14 days
"When I first saw Defense Against Configurations, I thought, 'Insurance companies will start requiring this.' When that time comes, we’re going to be ready. I’ll be able to show a compliance report, proof that our machines meet the standards.” ~ IT Director Mike Pritchard of STEM
Tweet card summary image
threatlocker.com
See how ThreatLocker DAC automatically identifies misconfigurations and maps them to your environment’s compliance and security requirements.
0
0
0
@ThreatLocker
ThreatLocker
14 days
This week at Gartner Orlando, ThreatLocker CEO Danny Jenkins and Senior Support Technical Engineer Remy Bitton showed how a simple USB can open the door to total data exposure, and how ThreatLocker Ringfencing™ shuts it down fast. Every app on your computer has the same access
0
0
0
@ThreatLocker
ThreatLocker
15 days
What a week! Gartner Orlando at Walt Disney World Swan and Dolphin comes to a close but the conversations are just getting started. 220 sessions covered the dramatic changes AI has brought to digital environments, and among those changes, the vulnerabilities created when AI helps
0
0
1
@ThreatLocker
ThreatLocker
15 days
A strong security stack is about layering the right defenses in the right order, delivering visibility and control without slowing systems or people down. Learn more in Part 3 of a four-part series, Moving into the modern era of security operations. https://t.co/ApRZfFu08O
0
0
0
@ThreatLocker
ThreatLocker
18 days
Last week, everything changed for Windows 10 users. While Windows 10 will remain operational, technical assistance, feature updates, and security updates will no longer be provided. Microsoft urges users to update their OS to Windows 11. The good news is that making the change
Tweet card summary image
threatlocker.com
Upgrade to Windows 11 faster with ThreatLocker® Defense Against Configurations. Identify unsupported machines and upgrade eligible systems in one place.
0
0
1
@ThreatLocker
ThreatLocker
21 days
At CTRL+ALT+DELlight Atlanta, the hot topic was Defense Against Configurations (DAC) and how it can prevent many cyberattacks by eliminating your misconfigurations. ThreatLocker CEO also took guests through a live demo to reveal how hackers view environments and showed how to
1
0
1
@ThreatLocker
ThreatLocker
23 days
You're invited! Join ThreatLocker to gain practical insights into defending against zero-day threats while enjoying a reception-style dinner and conversation with fellow cybersecurity professionals. You'll even earn one CPE credit. When: Tuesday, November 11 Where: Eixample,
Tweet card summary image
threatlocker.com
ThreatLocker networking events that explore hacking techniques and how to defend against them using Zero Trust principles. Join us November 11!
0
0
1
@ThreatLocker
ThreatLocker
25 days
Join us for live walkthrough of how to roll out Allowlisting, manage real-world exceptions, and keep users productive while you raise the security bar. It's happening October 16 at 11 a.m. EST when we go live with "New Allowlisting strategies to empower your security," a webinar
0
0
1
@ThreatLocker
ThreatLocker
25 days
Orlando area business leaders: Get ahead of cyber risk. Defend & Thrive on October 16 will give you actionable guidance straight from ThreatLocker CEO Danny Jenkins. Bring your laptop, bring your questions, get a plan. Join us for this no-cost event:
Tweet card summary image
threatlocker.com
Join us for Defend&Thrive, an evening for Orlando area executives with small and medium-sized businesses who want to prevent cybersecurity incidents.
0
0
1
@ThreatLocker
ThreatLocker
28 days
The Morton v. Salesforce & TransUnion lawsuit is testing trust in SaaS platforms. When voice phishing becomes a data breach vector, every CISO needs to sit up and pay attention. https://t.co/UzTrjDo7FN #SaaS #Cybersecurity #CISO #DataBreach #Trust #CloudSecurity #ThreatLocker
Tweet card summary image
threatlocker.com
Morton v. Salesforce and TransUnion separates allegations from acknowledged facts and shows CISOs how to blunt vishing-driven SaaS breaches with concrete controls.
0
0
1