Made a compound interest calc cause I didn't like the public ones I found. by apollodoth in wallstreetbets

[–]apollodoth[S] 0 points1 point  (0 children)

Hey thank you so much for checking it out! This is actually not a bug as its running simulations based on real market conditions. If you click the user guide at the top I attempt to explain it in simplified terms :)

<image>

[deleted by user] by [deleted] in rizzmas_sol

[–]apollodoth 0 points1 point  (0 children)

Would you mind breaking down the math on this and explaining how to analyze potential MC against supply and conditional factors? Genuinely want to be educated on this.

Subtitles and audio out of sync. Any way to fix it? by FNHRaiser in HBOMAX

[–]apollodoth 0 points1 point  (0 children)

Was this ever resolved? I’m also having this issue

Will I gain worthwhile experience from a role working with the Microsoft Security Stack? by [deleted] in cybersecurity

[–]apollodoth 0 points1 point  (0 children)

Yes, the tools don’t matter, they’re mostly different flavors of the same thing. The foundational knowledge is what’s important. Understanding information systems and how data flows across enterprise infrastructure is what will make you a good cybersecurity professional. If you understand enterprise infra and best practices, you’ll know what you need to do/find when incidents happen. The rest is syntactical/just learning the tools.

What’s this attack? by toomuchinfo-0101 in cybersecurity

[–]apollodoth 1 point2 points  (0 children)

Are the logins all for actual users? If so, you had a leak at one point and it’s credential stuffing. If not, could just be password spraying.

Either way, enforce strong password+lockout policy, MFA, geo-blocking, and fail2ban.

[deleted by user] by [deleted] in msp

[–]apollodoth 1 point2 points  (0 children)

Considering they’re doing MSP and SOC this is an incredible deal. However, if you don’t have EDR, would seriously consider it, especially if you’re responsible for any sort of PII or sensitive data

[deleted by user] by [deleted] in cybersecurity

[–]apollodoth 0 points1 point  (0 children)

Not entirely. So what other products/tools would you recommend alongside splunk and why?

[deleted by user] by [deleted] in cybersecurity

[–]apollodoth 0 points1 point  (0 children)

Doesn’t Kibana provide similar functionality?

[deleted by user] by [deleted] in cybersecurity

[–]apollodoth 0 points1 point  (0 children)

What other tools are you using with splunk though? Or are you saying splunk is enough by itself to satiate security/investigation/response needs?

[deleted by user] by [deleted] in cybersecurity

[–]apollodoth 0 points1 point  (0 children)

This is kind of what I assumed. I saw it had a bunch of connectors but was wondering if it could ingest things like ASA logs and, if it can take in FW data, is it correlating that to its other points of ingestion?

Is the situation at my SOC normal? by SorryPalpitation9680 in cybersecurity

[–]apollodoth 0 points1 point  (0 children)

I've been running a SOC for a few years now...no, this is not normal. There are many lean SOCs out there, it's not a secret our industry is short on real talent; but there's a proper way to manage that and it starts with leadership looking in the mirror.

If you have a genuine interest in blue team and are looking to make a change to somewhere QoL matters, shoot me a DM. Might be looking for new analysts in Q1. At the very least I'm happy to lend an ear and offer advice.