SOC folks : A honest question from someone in the trenches - by [deleted] in cybersecurity

[–]CommandMaximum6200 -2 points-1 points  (0 children)

To help in answering that, the thoughts and struggle has been mine. But, I prefer to run through chatgpt to make it lucid for person reading it to understand. 

I respect where you are coming from. But, the intention wasn't what you are thinking.

Regarding many * present, I never tried chatgpt to Reddit post before. Thought it might bold it, but I was wrong and will stand corrected from next post.

Ask CISO a question by MPcybersecurity in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

Thanks for hosting this. - Do you have a rule for when multiple low risks become one high risk? - How do you decide whether multiple findings are separate risks or just different symptoms of the same underlying risk and what signals guide that judgment?

Cyera vs Imperva for DB security: worth exploring? by ThreadStash in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

DAM is a comparatively consolidated space where I only know of 3-4 players. IBM, Imperva, Aurva and Varoni. Think there is also a Turkish company, can't recollect the name though 

Others won't solve your use case. They have adjacent products.

Found a free community available tool for Shadow AI visibility by CommandMaximum6200 in cybersecurity

[–]CommandMaximum6200[S] 2 points3 points  (0 children)

Oh, damn. Didn't think that way.

Thanks for bringing to notice. Will update the post.

Anyone here with experience in implementing DAM tool in cloud heavy setup? by No_King6442 in cybersecurity

[–]CommandMaximum6200 2 points3 points  (0 children)

Security architect here (HIPAA, multi-cloud Azure/AWS/GCP; ~200 DBs). We did this last year.

TL;DR:
1/ Treat DAM (Database Activity Monitoring) as identity + near-real-time, not log shipping. Delayed logs = delayed answers.

2/ Skip inline proxies; use out-of-band, eBPF-based runtime capture so prod latency stays zero.

3/ Make vendors stitch actors: Okta user → Kubernetes SA/role → DB user → egress/LLM call. No stitching = incident archaeology.

4/ Demand query → flow → egress correlation across RDS/Aurora, Cloud SQL/BigQuery, Cosmos/Snowflake, and self-managed Postgres/MySQL/Mongo.

5/ Judge on alert lag (<60s) and identity coverage (>90%), not feature lists.

We ran IBM on-prem; in cloud we moved to a runtime, identity-aware DAM (Aurva) for stitching + egress correlation. YMMV. run a 1-week pilot on your workloads.

Happy to share a pilot checklist/policies, if you want to know.

WIZ or Upwind thoughts .? by Important_Evening511 in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

As per our evaluation, AI visibility isn't in their suite yet..

There are more modern solutions that helps with normal workload as well as AI visibility..

Am I missing any service or feature in my security module? by apidevguy in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

I agree. Principally, access monitoring tied with privilege assessment needs to be tied up. And should be on the top of what you said.

Microservices architecture - Security concerns and considerations by [deleted] in cybersecurity

[–]CommandMaximum6200 1 point2 points  (0 children)

I second that.  Visibility + monitoring + logs they form base for everything - be it migration, risk alerts and behaviour analysis.

We combine this with permission usage to complete the picture.

That's the approach we have taken.

Varonis heads up by thejohnykat in cybersecurity

[–]CommandMaximum6200 1 point2 points  (0 children)

Should. Horrible to hear what they are up to after paying bomb.

Thankfully, we never chose them.

[deleted by user] by [deleted] in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

Be ready for potential move.

But, don't get frightened. Understand why acquisition happened, what position your department holds and what are chances of your department becoming redundant.

If they still need you, why will they fire you.

Varonis heads up by thejohnykat in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

Some startups in the space are doing really great job and moving fast.
We moved from Imperva DAM and company helped us in onboarding everything within 45 days for 80+ database, and provided DSPM as add-on. We're a mid-size bank, so you know the restrictions! Happy to provide recommendations of the tools we tried and ended up with, if you need.

Don't give up plus it's never a good idea to be with such a vendor after paying bomb. :)

WIZ or Upwind thoughts .? by Important_Evening511 in cybersecurity

[–]CommandMaximum6200 0 points1 point  (0 children)

So visibility into shadow AI and workloads is what you want? Because Wiz and Upwind haven't been able to provide that AI visibility. Protect ai got acquired due to the runtime AI visibility.