rstgermain.bsky.social
Cybersecurity consultant | Tennis fanatic | Good food makes me happy
10 posts
18 followers
151 following
Getting Started
comment in response to
post
A basic detection use case could even be cmd.exe spawning from the parent RMM process as many of these tools have a remote terminal feature. Also, pick a solution that allows for the centralized collection of audit logs and SSO to enforce identity protections and centralized mgmt
comment in response to
post
You tagged the wrong person
comment in response to
post
I think it’s also subject matter dependent. I follow the cybersecurity domain and it’s relatively active on here.
comment in response to
post
Hope they got the performance package adde to those
comment in response to
post
Not yet. As a lifelong Lexus owner I have certain expectations for reliability and Rivian doesn’t meet that yet and I’m prob spoiled lol. Love our r1s but would not own one outside of warranty at this time which is why we lease.
comment in response to
post
It’s frustrating talking with clients who say their next gen product would prevent everything BUT fail to rotate passwords and all of their priv service accounts have passwords listed on a breach website.
comment in response to
post
I’ll send you two quid for access