One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 563510
Date de publication 2018-04-03 13:00:00 (vue: 2018-04-03 15:07:01)
Titre Security Myths : TweetChat Roundup
Texte Continuing our tradition of tweetchats, we were fortunate to have the brilliant Lesley Carhart join us as a special guest to share her views on security myths. It was a lively discussion with many viewpoints shared. Searching for the #AlienChat hashtag should give you a good insight into all the conversation. Incident response We kicked things asking what people thought were some of the biggest myths or misconceptions around incident response. Q1: What are the biggest misconceptions in the #infosec industry when it comes to Incident Response? #AlienChat — AlienVault (@alienvault) March 15, 2018 Lesley summed up the thoughts of many that incident response isn’t necessarily a rapid process. A1: A misconception I see a lot is that it’s a fast process. IR certainly involves quite a bit of emergency triage and first response, but actual forensic analysis of incidents takes hours upon hours of evidence processing and painstaking analysis. #AlienChat — Lesley Carhart (@hacks4pancakes) March 15, 2018 Additionally, many viewpoints were shared That attribution is the end of the hunt instead of its beggining — Arthur (@lomokol2) March 15, 2018 And it’s critical that more people are involved. When running a tabletop, there is always one guy who “knows all the answers.” The first thing I do is kick him out of the room (e.g. he’s on vacation and can’t be reached) and see how the rest of the team runs. #AlienChat — Hacker⚡️Hiker (@hackerhiker) March 15, 2018 A1: that the validity of first analyses will be held up. Your first results will not necessarily encompass the whole scope of an incident or even be the real target. It could take even days to determine actual and full extent of impact #AlienChat — killall -9 khaxan (@khaxan) March 15, 2018
Envoyé Oui
Condensat #alienchat #culture #infosec 2018 =clte @alienvault @chrisplummer @heyitsmikeyv @infosec @jack @khaxan @writerunroar a10: able actively additional against agreed agv5axrzbwlrzxl2 alienvault all although any appear are around asking attack because been being benign binary brian broad build business can case changed chris clicked collaborating comes common components conclusion consistently continually continuing crowd dangerous defend detect detection discussion doesn't don't easy ecosystem end enough even evolving expect extra eyes file fixing forward freak future generate get getting going habit halon has have hayes hour how hung impact information infosec integration intelligence issues it's it’s jack join just keep khaxan killall know knowledge let look lot love malicious marathon march maybe mean misconceptions mistakes modification months more most much myths need network next not open others out own packets participants patch people plummer ports present punitive q10: reality realize really roundup said samurai save says script security see set shared small so  someone something source suggestions surface than themes things think thoughts threat threats time timestamps timestomping today's tools topics track trivially truths tweetchat tweeting undervaluing unseen updates upon users using webroot weird what when which without would wrapped wrong your
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: