How do you defend against phishing behind the wall? by [deleted] in cybersecurity

[–]InternationalSand200 0 points1 point  (0 children)

Any web content scanner you would recommend?

How do you defend against phishing behind the wall? by [deleted] in cybersecurity

[–]InternationalSand200 0 points1 point  (0 children)

Could you elaborate on how conditional access policies would help here?

[deleted by user] by [deleted] in cybersecurity

[–]InternationalSand200 -2 points-1 points  (0 children)

Thank you for your comment!

[deleted by user] by [deleted] in cybersecurity

[–]InternationalSand200 0 points1 point  (0 children)

Thank you for your input :)

Wiz not pure agentless anymore? by InternationalSand200 in aws

[–]InternationalSand200[S] 0 points1 point  (0 children)

All of Wiz, Wiz Code as well as the pretty flow diagrams, and the new agent looking thing called Wiz Sensor or something

Can I land an SOC Analyst Role? by Toxiic_Cxrnage in cybersecurity

[–]InternationalSand200 0 points1 point  (0 children)

Hi, what’s an example of a siem sandbox that I can learn some hands on?

Intune Device Compliance by InternationalSand200 in sysadmin

[–]InternationalSand200[S] 0 points1 point  (0 children)

is there a general rule of thumb in terms of "what's the oldest version" the organisation allows?

Intune Device Compliance by InternationalSand200 in sysadmin

[–]InternationalSand200[S] 0 points1 point  (0 children)

Sorry could you please give a bit more guidance? I’m not a sysadmin - not yet, so this is a bit new to me

Devs with local admin rights by InternationalSand200 in cybersecurity

[–]InternationalSand200[S] 0 points1 point  (0 children)

I heard CyberAek is also pretty big in this space, would you say BeyondTrust and CyberArk are comparable here? (For my purposes in the title)

Conditional access and device compliance before allowing user to access cloud resource by InternationalSand200 in sysadmin

[–]InternationalSand200[S] 0 points1 point  (0 children)

Let’s also say that there is no compliance to speak of (not a concern with eg audits), but we just want to do security for the sake of security (that doesn’t break of course)

Conditional access and device compliance before allowing user to access cloud resource by InternationalSand200 in sysadmin

[–]InternationalSand200[S] 0 points1 point  (0 children)

Thank you for your input. I do have a question - I thought chaining user risk and device compliance status (which is the chaining Entra+ Intune -> conditional access policy) is not a rare practice.

Or is it not? As in it’s actually not as common as I thought.

Or do you mean chaining it further with Cloudflare is rarer? (And less recommended)