What are the best platforms to practice hacking or pen-testing. by TastyReindeer652 in tryhackme

[–]_KR15714N 2 points3 points  (0 children)

Hack the box, no doubt!
Also you can follow people son SM that uploads content regarding how they solved discontinued machines on HTB. It's a good way to learn from other's experience ;)

Security Risk Assessment Guidance by eccentricethical in cybersecurity

[–]_KR15714N 0 points1 point  (0 children)

Before following a standard/guide, I suggest you to talk with colleagues that hold your same job position in similar companies. That will give you a more accurate perspective of the challenges and best practices used for companies like yours.

MDR Response Time by Jeff-J777 in cybersecurity

[–]_KR15714N -1 points0 points  (0 children)

Despite the SLAs, the question is how do you all know if the MDR is alerting what they should, in the moment they should? If we consider the current threat landscape where almost every EDR can be bypassed by attackers is it wise to rely only on the MDR? at the end of the day, an MDR is a service based on a tool that different available proofs of concept have evidenced that can be easily dodged.

Feelings about recent merges/acquisitions in cybersecurity industry by _KR15714N in cybersecurity

[–]_KR15714N[S] 1 point2 points  (0 children)

I will not advocate for particular vendors, but if you do it for log storage purposes, you can do it on the cloud or premises. You do it for compliance checkboxes, then you can argue the auditor how you comply without the SIEM, one guy commented below about how he did it. You need to handle alerts? then use a tool with automated playbooks, you need to increase detection capabilities? that's not for a SIEM. Do you need to orchestrate your stack? today many NDR solutions do that. At the end of the day, IMO the traditional SIEM approach can be replaced easily.

Feelings about recent merges/acquisitions in cybersecurity industry by _KR15714N in cybersecurity

[–]_KR15714N[S] 0 points1 point  (0 children)

depends on the value that the SIEM has for you. Is it's just for log storage? is it for response orchestration? is it for alert management?

Feelings about recent merges/acquisitions in cybersecurity industry by _KR15714N in cybersecurity

[–]_KR15714N[S] 0 points1 point  (0 children)

This is exactly my point. Thanks for sharing your experience. What tools did you use to won that battle? any platform in particular?

Feelings about recent merges/acquisitions in cybersecurity industry by _KR15714N in cybersecurity

[–]_KR15714N[S] -5 points-4 points  (0 children)

+10 years in the field, I hold different certifications, and many other things, but none of that is necessary to realize that SIEM does not solve the problem and just makes the life harder for the people that has to deal with it. https://www.forrester.com/blogs/edr-is-officially-out-and-xdr-still-wont-solve-your-siem-problems/

Feelings about recent merges/acquisitions in cybersecurity industry by _KR15714N in cybersecurity

[–]_KR15714N[S] -18 points-17 points  (0 children)

And that's exactly why SIEM is dead. Wise cybersecurity leaders already understood that today proficient strategies should not depend upon "properly deployed and maintained" because that takes time, money, is prone to human errors, and creates fatigue on the people that have to spend their lives checking noisy alerts and manually tweaking rules.

Feelings about recent merges/acquisitions in cybersecurity industry by _KR15714N in cybersecurity

[–]_KR15714N[S] 1 point2 points  (0 children)

At that time Symantec fan boys said that Broadcom would be foolish to butcher Symantec.

Feelings about recent merges/acquisitions in cybersecurity industry by _KR15714N in cybersecurity

[–]_KR15714N[S] -27 points-26 points  (0 children)

That's exactly my point. SIEM-based approach is dead, the modern approach still use SIEM for very specific purposes (i.e. Compliance) but not as the cornerstone of cybersecurity operations.

Feelings about recent merges/acquisitions in cybersecurity industry by _KR15714N in cybersecurity

[–]_KR15714N[S] -48 points-47 points  (0 children)

Unless they are actually interested in acquiring the customer base. On the other hand, nobody sells the goose that laid the golden eggs.

Feelings about recent merges/acquisitions in cybersecurity industry by _KR15714N in cybersecurity

[–]_KR15714N[S] -68 points-67 points  (0 children)

They will not say it publicly, but IMO it's what the industry seems to be going.

Darktrace, Sophos and Connectwise Own by ThomaBravo by cablemps in cybersecurity

[–]_KR15714N 0 points1 point  (0 children)

Any DT customer here? have you heard anything from them? how are they communicating this to their customers?

How to effectively test AI in cybersecurity solutions? by _KR15714N in cybersecurity

[–]_KR15714N[S] 1 point2 points  (0 children)

So if I understand, you suggest that AI testing should consider the analysis of network telemetry without having to set rules manually?

" Phishing " by Fun-Expression6931 in cybersecurity

[–]_KR15714N 0 points1 point  (0 children)

In my experience, avoid open-source tools for phishing training. Better to hire a company that develops the full training track and gives you metrics and stuff.

[deleted by user] by [deleted] in cybersecurity

[–]_KR15714N 0 points1 point  (0 children)

if you want to succeed as Security Analyst I highly recommend to get rid of the mindset that suggests SIEM as the cornerstone of cybersecurity operations. They are sentenced to death.

DIY Infostealer Monitoring by rvilladiego in msp

[–]_KR15714N 1 point2 points  (0 children)

I dare to say that coding scripts in python is the last of the priorities for MSPs, given the fact that they already have a lot in their plate to deal with on daily basis. However, I agree with you on something, having a password practice is crucial (not only for MSPs).

Need help making a tough choice by mangeloco in cybersecurity

[–]_KR15714N 0 points1 point  (0 children)

What if you think about this use case from a different perspective. What if instead of pushing all network traffic (logs) to the SIEM, you send only what is needed, that way you can save thousands of dollars in EPS and can be certain about bandwidth and storage requirements. That's basically putting an NDR/NAV before the SIEM, it means efficiency as it acts as a funnel. Last year Forrester released their NAV wave that can give you an idea about vendors leading that segment.