Threatscape Profile Banner
Threatscape Profile
Threatscape

@Threatscape

Followers
608
Following
39
Media
66
Statuses
267

#CyberSecurity solutions that perform at scale. We secure your critical IT assets at endpoints, across networks, and in the cloud.

London, UK & Dublin, Ireland
Joined August 2010
Don't wanna be here? Send us removal request.
@yeti195
Matthew Miles
5 months
A big shoutout to @WillTheFrenchie @Threatscape for their help and expertise is helping me setup a zero trust conditional access framework. Working with them has been such a great experience.
0
1
1
@Threatscape
Threatscape
7 months
Huge congratulations to Nathan Hutchinson on becoming a Microsoft Security #MVP! With his award in Identity & Access Management, Threatscape is now home to two Microsoft Security MVPs, demonstrating our expertise and commitment to the security community.
Tweet media one
0
2
7
@Threatscape
Threatscape
8 months
With attackers targeting user identities as their primary entry point, protecting access is no longer just an IT task; it’s a business imperative. #MicrosoftEntra #IdentitySecurity #CyberResilience https://t.co/V9c3MklAl1
Tweet card summary image
threatscape.com
Microsoft Entra ID (formerly Azure AD) is a cloud-based identity and access management service. But what's included, and what are the business benefits?
0
0
1
@Threatscape
Threatscape
8 months
In today’s threat landscape, trusting users or devices without rigorous verification is a recipe for disaster. Conditional access is the gatekeeper your organisation needs to enforce Zero Trust Security. #ZeroTrust #ConditionalAccess #CyberSecurity https://t.co/wFfoskxyDT
Tweet card summary image
threatscape.com
Conditional access is the key to Zero Trust success. Find out the signals driving conditional access, and its practical applications for cyber security.
0
0
1
@Threatscape
Threatscape
8 months
Even the best-intentioned policies can leave gaps, creating hidden vulnerabilities that attackers exploit. Avoid these five common mistakes and fortify your defences: #ConditionalAccess #CyberSecurity #ZeroTrust https://t.co/7zW7d5MfKY
Tweet card summary image
threatscape.com
Conditional Access offers a powerful way to enhance security, but it's not without its complexities. Avoid these common mistakes to maximise identity security.
0
0
1
@Threatscape
Threatscape
8 months
Your cloud isn’t as secure as you think. While cloud adoption accelerates, so do the risks—misconfigurations, exposed APIs, and shadow IT are leaving organisations vulnerable to attack. Check out the blog: #CloudSecurity #Threatscape #CyberResilience https://t.co/B9AjVK3Xlw
Tweet card summary image
threatscape.com
Understanding cloud vulnerabilities, including insecure APIs and weak access management, is key to maintaining a secure cloud-based business presence.
0
0
1
@Threatscape
Threatscape
9 months
Adversary-in-the-Middle (AiTM) attacks are bypassing even the strongest Multi-Factor Authentication, exposing organisations to devastating breaches. 👉 Read our blog to protect against AiTM attacks #CyberSecurity #AiTM #Threatscape #ZeroTrust https://t.co/bxBuxSj6q9
Tweet card summary image
threatscape.com
The risks associated with Adversary in The Middle (AiTM) attacks, how to detect an attack-in-progress, and protecting your organisation from AiTM threats.
0
0
2
@Threatscape
Threatscape
1 year
🎙️ @rucam365 & @DeviceDeploy delve into 3 critical ways #Intune Endpoint Privilege Management (#EPM) protects local admin: 1️⃣ User Confirmed Elevation 2️⃣ Automatic Elevation 3️⃣ Support Approved Elevation Watch the full episode here: https://t.co/uB3AUO0ZXW
0
0
1
@rucam365
Ru Campbell
1 year
New video: 5 common Entra Conditional Access mistakes (and how to avoid them) Catch it here: https://t.co/HTIrmAnVGY Big shout out to my man Razi at @Threatscape for his fantastic work on YouTube thumbnail clickbait gold.
Tweet media one
1
17
79
@Threatscape
Threatscape
1 year
We did it again! Delighted to be awarded Security Partner of the Year at the @Microsoftirl Partner of the Year awards last night. Huge thanks to the team for another incredible year!
Tweet media one
0
0
3
@rucam365
Ru Campbell
1 year
Learned a ton chatting to @kj_ninja25 about Defender for Endpoint on @Threatscape's latest podcast: • open-source tools for testing MDE against attacks • other uses for advanced hunting • day-to-day MDE management Check it out! YouTube:
1
18
83
@Threatscape
Threatscape
2 years
Tune into TodayFM from 4.30 as our CEO Dermot Williams joins Matt Cooper on The Last Word 👇🏻
@lstwrd
The Last Word
2 years
📻From 4.30 @cooper_m 🔵Spike in sophisticated investment scams @NiamhDavenport @Threatscape 🟡Farmers protest rising costs @farmersjournal @ShonaMurray_ 🔵Zuckerberg told he has blood on his hands @ADODonoghue 🟡Preview the 2024 hurling season 🔵Plus environment, movies & more
Tweet media one
0
0
0
@emmetjryan
Emmet Ryan, back in The D-SIX
2 years
Dermot Williams of @Threatscape is simply brilliant at explaining complex IT security issues in clear language. It was great to hear him on the Elio Business podcast with @JoeBLynam Listen to it now https://t.co/ROJhmzwEcH
Tweet card summary image
open.spotify.com
The Elio Business Podcast · Episode
0
10
11
@Threatscape
Threatscape
2 years
Does your organisation employ a Zero Trust model of verification? And if so, have you considered the move to ZTNA 2.0 in light of the fast-paced network security developments over the past few years? Graphic source: @PaloAltoNtwks #ZeroTrust #ZTNA #Cybersecurity #sase
Tweet media one
0
0
1
@Threatscape
Threatscape
2 years
Left of Bang – Get Ahead of Threats with Proactive Optimisation Check out this blog to learn more: https://t.co/DFkbLgll7X #cybersecurity #proactivesecurity #incidentresponse #securityplanning #securityoptimization
Tweet media one
0
1
0
@Threatscape
Threatscape
2 years
While VPN provides a secure tunnel for remote access to corporate resources, SASE provides a more comprehensive and integrated security solution making it a better choice. #SASEsecurity #CloudSecurity #RemoteWorkforce #Cybersecurity #VPN *Read More* https://t.co/ASif4NDkCh
Tweet media one
0
0
1
@Threatscape
Threatscape
2 years
Learn about the key components of a SASE solution and how it can help you improve your security posture, increase visibility and control, simplify management, and reduce costs. Click the link to read the full article. #SASE #cybersecurity #cloud #ZTNA https://t.co/GPg0vJ2hUi
threatscape.com
A SASE is a security solution designed to enable businesses to fully and safely utilise cloud-based services while maintaining a robust network security posture
0
1
0
@Threatscape
Threatscape
2 years
Is your business utilizing Microsoft 365 Security to its full potential? Download our eBook which outlines 10 key areas for optimization for a better security posture. https://t.co/UnAdXnjrKD #Microsoft365Security #Cybersecurity #M365security #securitybestpractices
Tweet card summary image
threatscape.com
Maximising Security Optimisation for M365 using these 10 settings recommended by cyber security experts at Threatscape
0
1
3
@Threatscape
Threatscape
3 years
The opportunities with M365 E3 or E5 are endless, but with so many capabilities at your fingertips... are you making the most of them? And even if you are, it can be confusing and insecure out of the box. Meet Overwatch for #M365Security 👇🏻 https://t.co/eDGMJUNlFp
0
1
0