Remove endpoint-security why-common-sense-is-not-so-common-in-security-20-answers
article thumbnail

20 Years of SIEM Webinar Q&A

Anton on Security

I recently did this fun SANS webinar titled “Anton Chuvakin Discusses “20 Years of SIEM?—?What’s As it is common for SANS webinars , we got a lot of great questions that I feel like re-answering here for posterity. So no convergence yet, and this means one can’t easily predict where it is going.

article thumbnail

Penetration Testing: What is it?

NetSpi Executives

How penetration testing is done How to choose a penetration testing company How NetSPI can help Penetration testing enables IT security teams to demonstrate and improve security in networks, applications, the cloud, hosts, and physical locations. Penetration testing reveals an organization’s security weaknesses.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On Detection: Tactical to Functional

Security Boulevard

It may not be immediately obvious why this is important, but understanding this concept will make many subsequent ideas much easier to parse. In doing so, he introduced me to a book called An Invitation to Applied Category Theory: Seven Sketches in Compositionality.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

So I would take things apart. Let’s see the power cord goes in here, so where that electricity go next, and how did it turn the toast brown. Let’s see the power cord goes in here, so where that electricity go next, and how did it turn the toast brown. Listen to EP 13: Shall We Play A Game? Apple Podcasts.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

So I would take things apart. Let’s see the power cord goes in here, so where that electricity go next, and how did it turn the toast brown. Let’s see the power cord goes in here, so where that electricity go next, and how did it turn the toast brown. Listen to EP 13: Shall We Play A Game? Apple Podcasts.

article thumbnail

Why the Rush to MDR?

Security Boulevard

LogicHub recently published a survey conducted by Osterman Research, looking at changing trends and attitudes of security professionals around Managed Detection and Response (MDR) services. Osterman Research explores why organizations early to embrace MDR services report higher security posture across multiple dimensions in.

article thumbnail

The Hacker Mind Podcast: When The Dark Web Discovered ChatGPT

ForAllSecure

Like most successful entrepreneurs, Ulbricht streamlined and perfected various aspects so that he could offer the sale of illegal drugs to anyone who could access the site. So I wanted to find out a few things, such as how big the dark web really is, and then what is the day to day life in the dark web even like.