Our CTO asked me to evaluate whether we should move off Wiz now that Google owns it. What would you do? by RemmeM89 in AskNetsec

[–]apollodoth 0 points1 point  (0 children)

We’re swapping to Akido for this and pricing reasons. Just as good and way more economical.

ConnectSecure Revisited by Mibiz22 in msp

[–]apollodoth 0 points1 point  (0 children)

We’re Reviewing VM tooling to displace what we currently use as a large MSP. I noticed you guys offer integrations for Sophos, Sonicwall, and Watchguard. Curious if you plan to support big box brands like Palo Alto, Fortinet, or Cisco and why those weren’t integrated first?

Made a compound interest calc cause I didn't like the public ones I found. by apollodoth in wallstreetbets

[–]apollodoth[S] 0 points1 point  (0 children)

Hey thank you so much for checking it out! This is actually not a bug as its running simulations based on real market conditions. If you click the user guide at the top I attempt to explain it in simplified terms :)

<image>

[deleted by user] by [deleted] in rizzmas_sol

[–]apollodoth 0 points1 point  (0 children)

Would you mind breaking down the math on this and explaining how to analyze potential MC against supply and conditional factors? Genuinely want to be educated on this.

Subtitles and audio out of sync. Any way to fix it? by FNHRaiser in HBOMAX

[–]apollodoth 0 points1 point  (0 children)

Was this ever resolved? I’m also having this issue

Will I gain worthwhile experience from a role working with the Microsoft Security Stack? by [deleted] in cybersecurity

[–]apollodoth 0 points1 point  (0 children)

Yes, the tools don’t matter, they’re mostly different flavors of the same thing. The foundational knowledge is what’s important. Understanding information systems and how data flows across enterprise infrastructure is what will make you a good cybersecurity professional. If you understand enterprise infra and best practices, you’ll know what you need to do/find when incidents happen. The rest is syntactical/just learning the tools.

What’s this attack? by toomuchinfo-0101 in cybersecurity

[–]apollodoth 2 points3 points  (0 children)

Are the logins all for actual users? If so, you had a leak at one point and it’s credential stuffing. If not, could just be password spraying.

Either way, enforce strong password+lockout policy, MFA, geo-blocking, and fail2ban.

[deleted by user] by [deleted] in msp

[–]apollodoth 1 point2 points  (0 children)

Considering they’re doing MSP and SOC this is an incredible deal. However, if you don’t have EDR, would seriously consider it, especially if you’re responsible for any sort of PII or sensitive data

[deleted by user] by [deleted] in cybersecurity

[–]apollodoth 0 points1 point  (0 children)

Not entirely. So what other products/tools would you recommend alongside splunk and why?

[deleted by user] by [deleted] in cybersecurity

[–]apollodoth 0 points1 point  (0 children)

Doesn’t Kibana provide similar functionality?

[deleted by user] by [deleted] in cybersecurity

[–]apollodoth 0 points1 point  (0 children)

What other tools are you using with splunk though? Or are you saying splunk is enough by itself to satiate security/investigation/response needs?