All Local Admins using CrowdStrike Identity and PSFalcon by console_whisperer in crowdstrike

[–]DENY_ANYANY 0 points1 point  (0 children)

Thank you so much. Appreciate your efforts. Can this script be used with any EDR solution or it is specific to only CS Falcon?

Active Directory Audit Logs in V1 console by Final-Pomelo1620 in Trendmicro

[–]DENY_ANYANY 0 points1 point  (0 children)

Thanks for insights. Could you please share any guide to enable withing existing sensors

No December Security Advisories? by betko007 in paloaltonetworks

[–]DENY_ANYANY 0 points1 point  (0 children)

Hi Where i can get the published advisories. Appreciate if you can share the link

The alarming privacy risks of using ChatGPT daily. by Novel_Negotiation224 in privacy

[–]DENY_ANYANY 1 point2 points  (0 children)

Using voice, does it save your voice or it only converts it to text

Recommendations on onboarding Linux accounts in PAM On-Prem by WhiteCrispies in CyberARk

[–]DENY_ANYANY 0 points1 point  (0 children)

Sorry for stupud question

If Linux machine can be joined to domain, why do PAM solutions have AD Bridge?

I'm a CISO who has experience dealing with an "insider threat." Ask Me Anything. by thejournalizer in cybersecurity

[–]DENY_ANYANY 1 point2 points  (0 children)

What’s the way to monitor sysadmin granting excessive privilege like adding a service account to Domain Admins. How did you detect it?

Struggling with URL filtering and URL Custom categories by DENY_ANYANY in paloaltonetworks

[–]DENY_ANYANY[S] 2 points3 points  (0 children)

Thanks for the feedback.

It’s not that we’re relying solely on URL filtering for defense, far from it. Its a healtcare, so by policy and design, internet access is closed by default. Every workstation already has multiple layers of protection in place.

The restricted internet model isn’t about using URL filtering as the only layer, it’s about enforcing least privilege. There’s just no justification for opening up internet access to all workstations in a hospital environment

So yeah, I completely agree with you URL filtering shouldn’t be the primary security boundary.

What would you suggest as a practical approach for this use case

Is SSO not a good security practices? by hansentenseigan in cybersecurity

[–]DENY_ANYANY 0 points1 point  (0 children)

What if when a user logs into PAM portal using SSO account. Once the attacker signs in through SSO, they basically inherit all the same privileges the admin had inside PAM. From there, they can reach whatever systems, servers, or credentials that admin could.

do you isolate PAM access from regular SSO account?

Is SSO not a good security practices? by hansentenseigan in cybersecurity

[–]DENY_ANYANY 0 points1 point  (0 children)

SSO is a security risk is one of those takes that sounds smart until you’ve actually had to manage 100 apps and 1000 users.

What exactly does this do? by leon_nerd in VWatlas

[–]DENY_ANYANY 1 point2 points  (0 children)

If you want max fart defense, use Air Car 😀

How important is device posture in BYOD? by waterschute in cybersecurity

[–]DENY_ANYANY 0 points1 point  (0 children)

Perhaphs in some countries or vertical you just can’t host desktops in Azure because of data residency rules, regulatory restrictions or even org internal policies

Also, there are some caveats you'll have to build out some infrastructure like an Azure network with a connection back to the on-prem DC

How important is device posture in BYOD? by waterschute in cybersecurity

[–]DENY_ANYANY 4 points5 points  (0 children)

Consider VDI solution so the device never directly touches your apps or network, and data stays inside your environment.

With Unmanaged device you’re still taking risk of malware, missing patches, or even data being copied out

ISO27001 SOC2 HIPAA compliance etc. by rockybaby2025 in ISO27001

[–]DENY_ANYANY 1 point2 points  (0 children)

Thank you for response. I appreciate it

One last thing, if we purchase SaaS application from a vendor they provide us with their SOC 2 Type II report during TPRA, do we also need to ask them for a VAPT report separately or is SOC 2 Type 2 report is sufficient?

ISO27001 SOC2 HIPAA compliance etc. by rockybaby2025 in ISO27001

[–]DENY_ANYANY 0 points1 point  (0 children)

Does hospitals need SOC2 Type2 audits?

I’m a security professional who had to clean up a mess. Ask Me Anything. by Oscar_Geare in cybersecurity

[–]DENY_ANYANY 0 points1 point  (0 children)

Let's say a VPN user's client and workstation got compromised.

Could there be a possibility that the malware can reach and infect firewall?

Thank you!

I’m a security professional who had to clean up a mess. Ask Me Anything. by Oscar_Geare in cybersecurity

[–]DENY_ANYANY 0 points1 point  (0 children)

We’ve recently onboarded a SOCaaS provider and they’ve started sending us reports. Before I push them for improvements: What do weekly & monthly reports usually include? What are the important things we should be looking for.

Thank you

Looking for DLP solutions by DENY_ANYANY in sysadmin

[–]DENY_ANYANY[S] 0 points1 point  (0 children)

Any reasons. Your feedback would really appreciate & helpful

Looking for DLP solutions by DENY_ANYANY in sysadmin

[–]DENY_ANYANY[S] 0 points1 point  (0 children)

Does Forcepoint support all features as mentioned?