ThreatLocker Tool Finds Hidden Gaps in Third-Party Settings
bankinfosecurityCEO Danny Jenkins on Addressing Vulnerabilities in the Federal Sector Michael Novinson (MichaelNovinson) • January 2, 2026

Third-party configurations are difficult to manage since exceptions made by IT staff - such as allowing an entire Windows directory for execution - turn into invisible risks over time.
See Also: New Attacks. Skyrocketing Costs. The True Cost of a Security Breach.
Scanning third-party environments for risk and alerting users with contextual information, regardless of if policies were applied via group policy objects, scripts or third-party tools, is vital, said ThreatLocker Co-Founder and CEO Danny Jenkins.
ThreatLocker can look into Windows registries, validate if system protections are enabled, track evolving best practices and explain to customers why a configuration is insecure and how it might be exploited (see: Scaling Zero Trust: How ThreatLocker Uses Series D Funds).
"One of the things that happens is you get creep," Jenkins said. "You get IT people - they'll come ...
Copyright of this story solely belongs to bankinfosecurity . To see the full text click HERE

