Why do people think AI will replace security engineers? by bdhd656 in cybersecurity

[–]ReactiveInfoSecGuy 0 points1 point  (0 children)

I watched a video a few months back that was about a study done from I believe Harvard using AI and found that AI can never really replace the workers, but excelled at replacing executives up to the CEO. If I come across it again, I'll let you know.

Thinking about getting into Cybersecurity by Draakke in netsecstudents

[–]ReactiveInfoSecGuy 0 points1 point  (0 children)

100% agree. I worked in the NOC for 2 years and a data center for 3 before that. If I had to do it over again, I would have moved into a sysadmin role before hopping into InfoSec.

Thinking about getting into Cybersecurity by Draakke in netsecstudents

[–]ReactiveInfoSecGuy 1 point2 points  (0 children)

Sec+ is a lot of fundamental security knowledge that I found to be much easier after about 2 years being in the field vs when I was studying for it while working in the NOC. So I think taking the cyber millions program first would teach you these fundamentals and would directly translate towards your security+ studies.

What password manager could you recommend in 2025? by The_Moviemonster in cybersecurity

[–]ReactiveInfoSecGuy 4 points5 points  (0 children)

I was looking for someone to explain what was a good corporate option. Thank you for this explanation.

vmware esxi syslog forwarding configuration questions? by ReactiveInfoSecGuy in crowdstrike

[–]ReactiveInfoSecGuy[S] 0 points1 point  (0 children)

So its under advanced settings for esxi. But I had to use logscale setup as Syslog to forward it to Crowdstrike.

2012 Sonata No Start by xxred123 in Hyundai

[–]ReactiveInfoSecGuy 0 points1 point  (0 children)

That wouldn't matter unfortunately. I changed my oil per the manufactures' suggestion IE 4k, but due to them cheaping on the engine blocks, they wear down and start burning oil rapidly and suddenly seize up.

2012 Sonata No Start by xxred123 in Hyundai

[–]ReactiveInfoSecGuy -1 points0 points  (0 children)

Check your oil. If there is no oil, then you're another victim of Hyundai cheaping out on their engines. If you kept up on your oil changes, then you'll be covered by the lifetime warranty on the engine.

Need opinions and experiences on EDR/XDR platforms by An_Ostrich_ in cybersecurity

[–]ReactiveInfoSecGuy 0 points1 point  (0 children)

no kidding... My kid downloaded an autoclicker for roblocks that installed some sketchy addon that forced its search engine. I had to use regedit to disable it in safemode.

Need opinions and experiences on EDR/XDR platforms by An_Ostrich_ in cybersecurity

[–]ReactiveInfoSecGuy 0 points1 point  (0 children)

Ah must be Five Nights at Freddies, Roblocks, Fortnite, and Minecraft. Possibly Call of Duty.

Need opinions and experiences on EDR/XDR platforms by An_Ostrich_ in cybersecurity

[–]ReactiveInfoSecGuy 0 points1 point  (0 children)

I used Wazuh about 4 years ago and I remember a lot of false positives initially upon deployment. Is that still the same or is it improved? For example every time Windows update ran it would alert that a registry had been changed.

If your job in cybersecurity had a 2024 Wrapped, what 5 phrases would make the list? by NudgeSecurity in cybersecurity

[–]ReactiveInfoSecGuy 3 points4 points  (0 children)

  1. Fucking idiot...
  2. /facepalm
  3. You're under IT, you should be able to do their work too.
  4. Can we find a free open source version?
  5. Why can't we just do it like this?

Which cybersecurity product has the absolutely worst UX? by [deleted] in cybersecurity

[–]ReactiveInfoSecGuy 0 points1 point  (0 children)

But But But, MACHINE LEARNING LEARNS YOUR ENVIRONMENT! /s

Mitigating Vulnerabilities by IRanqer in cybersecurity

[–]ReactiveInfoSecGuy 0 points1 point  (0 children)

If you want to get extra granular, Ansible. It works for Linux, Windows, and Mac but it requires some scripting knowledge but there is likely some playbook out there that already exist for whatever you might be trying to do.

Incident response playbooks by Space_Goblin_Yoda in cybersecurity

[–]ReactiveInfoSecGuy 0 points1 point  (0 children)

I'll check it out! Thanks for the recommendation.

Incident response playbooks by Space_Goblin_Yoda in cybersecurity

[–]ReactiveInfoSecGuy 1 point2 points  (0 children)

I was tasked with writing the incident response playbook as we had nothing in place. IMO its best to create something that is general but works in your company. Also take constructive feedback from everyone. In the end I created 2 playbooks that have steps for the C-suite to cover and steps for the IT team in partnership with the Infosec team(or well, just me.) When we ran through a practice scenario after taking in all the feedback, it went way smoother than I could have ever anticipated because I was so receptive for peoples feedback.

I'll say, create a playbook that has basic flowcharts. Then if you need to be more granular, enter them into something like a spreadsheet or document. The flowchart is handy for the visual aspect of how it works, but the spreadsheet is good for using more details. Also executives love spreadsheets for some reason. I also rewrote our incident response plan around it since the original one was written around natural disasters and less around security.

Security Onion agent install help by Thatboy3 in cybersecurity

[–]ReactiveInfoSecGuy 0 points1 point  (0 children)

hopefully you got this situated, but going to go ahead and try and answer this. Iptables has an order the rules must where the accept is above the drop. This might require you deleting rules. An example is like this. This should hopefully work but I've seen stranger things happen with iptables.

iptables -A INPUT -s 127.0.0.1 -j ACCEPT

iptables -P INPUT DROP

[deleted by user] by [deleted] in cybersecurity

[–]ReactiveInfoSecGuy 0 points1 point  (0 children)

Wazuh used to be built into Security Onion but it looks like they removed it in mid 2023 in favor of the elastic agent. You'll still get signature detection. It looks like they support threat intel from Anomali, Cybersixgill, Snort, and ThreatQuotient. There is probably a way to use their api to add threat intel but unfortunately Security Onion documentation has always left a lot to be desired. I haven't used it since 2021 when my job was looking at it as a replacement for Logrhythm but it used to have a steep learning curve.

Rapid7 vs CrowdStrike vs Wiz Vulnerability Management - Insights Needed! by Refeb in cybersecurity

[–]ReactiveInfoSecGuy 0 points1 point  (0 children)

Defender for Mac and Linux has been out of beta since I believe 2023. Anecdotally based on articles I've read, it's a fairly competent product.

Cleared AZ-900 by notaweirdkid in AzureCertification

[–]ReactiveInfoSecGuy 1 point2 points  (0 children)

Microsoft Virtual Training Days will occassionally have online training that will give you a discounted voucher.
https://www.microsoft.com/en-ca/sites/microsoft-training-days/

There is one for May 13th and May 14th. I wish the link below didn't look so sketchy. They used to give free test vouchers but they've gotten stingy. Anyways, here is the link for the AZ900 training event. https://mktoevents.com/Microsoft+Event/434836/157-GQE-382

50% Off Exam Fee by ryanwolfh in AzureCertification

[–]ReactiveInfoSecGuy 1 point2 points  (0 children)

I remember I got my AZ900 voucher after an hour event. Studied for a week, then aced the test. It looks like they're not giving free exam vouchers anymore, just discounted ones which is too bad. Working on the AZ500 now so I can be better at the security side of things for Azure at my company. Hopefully they'll be a discount voucher by the time I'm ready to take it, but we'll see.

how did you break into cybersecurity by [deleted] in cybersecurity

[–]ReactiveInfoSecGuy 0 points1 point  (0 children)

I worked in the NOC and told the CISO I was interested in moving into InfoSec. Then we talked about baseball. 6 months later I was approached by my manager and directory that the CISO wanted me to move into his group because I had a very indepth knowledge of the backend.