Tech »  Topic »  ThreatLocker Tool Finds Hidden Gaps in Third-Party Settings

ThreatLocker Tool Finds Hidden Gaps in Third-Party Settings


CEO Danny Jenkins on Addressing Vulnerabilities in the Federal Sector Michael Novinson (MichaelNovinson) • January 2, 2026

Third-party configurations are difficult to manage since exceptions made by IT staff - such as allowing an entire Windows directory for execution - turn into invisible risks over time.

See Also: New Attacks. Skyrocketing Costs. The True Cost of a Security Breach.

Scanning third-party environments for risk and alerting users with contextual information, regardless of if policies were applied via group policy objects, scripts or third-party tools, is vital, said ThreatLocker Co-Founder and CEO Danny Jenkins.

ThreatLocker can look into Windows registries, validate if system protections are enabled, track evolving best practices and explain to customers why a configuration is insecure and how it might be exploited (see: Scaling Zero Trust: How ThreatLocker Uses Series D Funds).

"One of the things that happens is you get creep," Jenkins said. "You get IT people - they'll come ...


Copyright of this story solely belongs to bankinfosecurity . To see the full text click HERE