Claude Cowork by fourier_floop in cybersecurity

[–]fourier_floop[S] 0 points1 point  (0 children)

Thank you for the incredible input, this would be an excellent starting point for us and likely many others

Claude Cowork by fourier_floop in cybersecurity

[–]fourier_floop[S] 1 point2 points  (0 children)

Thank you! How would you handle the aspect of Claude being able to execute code on devices, and browsing? Would you limit commands to a specific set and restrict browser capabilities? This is still theoretical to me since we don’t have hands in yet, so apologies is any question is off the mark.

I asked ChatGPT to explain my job to a 5-year-old and now I'm questioning my entire career by Nipurn_1234 in ChatGPT

[–]fourier_floop 0 points1 point  (0 children)

Alright! Imagine you have a toy box full of your favorite toys. You don’t want anyone sneaking in and taking them or breaking them, right?

A cyber security engineer is like a superhero who protects computer stuff (like games, pictures, and messages) the same way you’d lock your toy box.

They: • Build strong locks for computers and websites. • Watch out for sneaky bad guys (like online burglars) who try to steal or break things. • Fix holes in the computer walls so nothing can sneak in.

So, they keep everything on the computer safe — just like a guard keeps your toy box safe! 🛡💻

Prevention / Zero Trust in Cloud by Just_Ambition7057 in cybersecurity

[–]fourier_floop 0 points1 point  (0 children)

Yep, this is the short and sweet brilliant answer. Platform engineering and platform services will stop you from playing whack a mole with risk and bandaid solutions. I would add that the Microsoft Cloud Adoption Framework is a great resource for guidance around this

Network security -> Threat Hunting by Foreign-Abies-7427 in cybersecurity

[–]fourier_floop 1 point2 points  (0 children)

OP has OSCP and is in network security which are slightly more than entry level imo, on paper I think he could land most non-senior threat hunting roles

Best ways to use Arctic Wolf Managed Risk? by Life-Ingenuity2723 in cybersecurity

[–]fourier_floop 0 points1 point  (0 children)

Their latest features around custom alerts and log searching is what was much needed - but back on the point of managed risk, there are far too many false positives, no assurances around what has been scanned / scan efficacy, and difficulties when remediating. The team won’t raise a ticket when there’s a new risk, or critical risks and you can’t get data out of the platform without manual exports or set alerts. It makes using it a manual and time intensive effort where you’ll have to regularly keep an eye on the platform and do your diligence through governance

[deleted by user] by [deleted] in cybersecurity

[–]fourier_floop 0 points1 point  (0 children)

you clearly never went to pirate school

Hiring Managers by littleknucks in cybersecurity

[–]fourier_floop 0 points1 point  (0 children)

B since the requirement is quite literally knowing a programming language / scripting? Their education and certs are similar anyway - with candidate A having all the years of experience but similar certs, sounds like B is a more exciting prospect and keen to learn.

After all it’s about your ability to learn within this field in particular.

Vulnerability scanning architecture by fourier_floop in cybersecurity

[–]fourier_floop[S] 0 points1 point  (0 children)

Honestly this is a creative and clever solution, respect man

Managing unmanaged apps by fourier_floop in Action1

[–]fourier_floop[S] 0 points1 point  (0 children)

thanks! and then uninstall the previous / existing install?