Threat Intel
COVID-19 STATEMENT
Cyber Security advice & implications
Stopping Device Code Flow Attacks in Entra ID
As observed by Microsoft, device code flow attacks have been used at scale, with attackers leveraging messaging platforms and convincing social engineering to obtain valid
The Five Steps of Continuous Threat Exposure Management
Continuous Threat Exposure Management (CTEM) provides a proven framework for turning complex security challenges into clear, targeted actions. As digital estates grow across on-premises, cloud,
Threatscape Has Secured Significant Investment from Horizon Capital
Threatscape has secured significant investment from Horizon Capital to accelerate growth through both organic expansion and a targeted buy and build strategy.
What is Continuous Threat Exposure Management, or CTEM?
Cyber security teams are under sustained pressure. Enterprise environments continue to expand across cloud platforms, SaaS applications, remote endpoints, identities, APIs, and third party services.
Threatscape Awarded at Arrow Partner Summit
Threatscape are proud to announce a double success at 2025’s Arrow Partner Summit. We received two prestigious awards: Partner of the Year for 2025, and
The Business Case for CTEM and Continuous Visibility
The pressure on security leaders has never been greater. Hybrid work, sprawling cloud estates, and a continuous stream of new applications have created an environment