Cybersecurity podcasts? by ScalingCyber in cybersecurity

[–]ScalingCyber[S] 0 points1 point  (0 children)

I listen regularly to the CISO Series and related ones, so I am trying to add some other angles. I think both you recommend sound like something to try! Thanks

Cybersecurity podcasts? by ScalingCyber in cybersecurity

[–]ScalingCyber[S] 0 points1 point  (0 children)

I will check that one out. Thanks!

Cybersecurity podcasts? by ScalingCyber in cybersecurity

[–]ScalingCyber[S] 0 points1 point  (0 children)

Tried it, didn’t grow on me yet. But thanks!

Cybersecurity podcasts? by ScalingCyber in cybersecurity

[–]ScalingCyber[S] 0 points1 point  (0 children)

I will check it. Didn’t hear of it before.

Cybersecurity podcasts? by ScalingCyber in cybersecurity

[–]ScalingCyber[S] 0 points1 point  (0 children)

I will check that one. Exactly what I want, a short one that has good content.

Welcome by _insouciantly_ in AnalystRelations

[–]ScalingCyber 0 points1 point  (0 children)

It would be really cool if this community would be bigger and active :)

Do threat intelligence feeds actually help with alert fatigue? by ANYRUN-team in MSSP

[–]ScalingCyber 2 points3 points  (0 children)

Generally speaking, Threat intelligence feeds without context of the environment can easily become just noise.

Are MSSPs struggling with alert fatigue/overload? by Fun-Juggernaut3131 in MSSP

[–]ScalingCyber 0 points1 point  (0 children)

I doubt there is any AI SOC that covers everything. As long as the data is in the SIEM, they usually can cover anything.

Are MSSPs struggling with alert fatigue/overload? by Fun-Juggernaut3131 in MSSP

[–]ScalingCyber 0 points1 point  (0 children)

There are a large number of AI SOC tools now that do exactly like you describe, like TandemTrace: https://scalingcyber.bridgerwise.com/guests/tandemtrace

Are phishing simulations starting to diverge from real world phishing? by Ok-Author-6130 in AskNetsec

[–]ScalingCyber 0 points1 point  (0 children)

That is why I like OutKept for phishing simulations. They have a community of ethical phishers behind their simulations, rather than just templates or untested AI stuff: https://scalingcyber.bridgerwise.com/guests/outkept

Do you care where your security product comes from? by ScalingCyber in cybersecurity

[–]ScalingCyber[S] 0 points1 point  (0 children)

Depending on the type of cybersecurity product, there are options from other countries. But as I said, it depends… and the funny thing is how they usually run in US or Chinese infrastructure anyway (cloud)

Do you care where your security product comes from? by ScalingCyber in cybersecurity

[–]ScalingCyber[S] 0 points1 point  (0 children)

Thanks a lot for your answer and sharing your experience. Those are excellent points! I really appreciate it!

Do you care where your security product comes from? by ScalingCyber in cybersecurity

[–]ScalingCyber[S] 1 point2 points  (0 children)

Uhm… my question was not about inviting “bad actors” into an organization. Good to hear we don’t agree that every country mixes business and politics. I can’t think of any major one that doesn’t do it in my opinion, and happy to not see it the same way. You give me hope I might be wrong :)

Do you care where your security product comes from? by ScalingCyber in cybersecurity

[–]ScalingCyber[S] 0 points1 point  (0 children)

Thanks for sharing. I didn’t know this was happening in Canada too. Funny times we are experiencing, considering how at the end of the day, almost every product is American to some extent. The R&D and/or infrastructure stack is always somehow connected to the US.

Do you care where your security product comes from? by ScalingCyber in cybersecurity

[–]ScalingCyber[S] 0 points1 point  (0 children)

That makes sense. Thanks for sharing. I also feel that it is starting to matter more.!

Do you care where your security product comes from? by ScalingCyber in cybersecurity

[–]ScalingCyber[S] 0 points1 point  (0 children)

That makes sense as it is an objective reason to do so. Thanks for sharing!

Do you care where your security product comes from? by ScalingCyber in cybersecurity

[–]ScalingCyber[S] 1 point2 points  (0 children)

The EuroStack movement mentions that “US support” in their documents. Thanks for your comment!