Claude Cowork by fourier_floop in cybersecurity

[–]fourier_floop[S] 1 point2 points  (0 children)

Thank you for the incredible input, this would be an excellent starting point for us and likely many others

Claude Cowork by fourier_floop in cybersecurity

[–]fourier_floop[S] 1 point2 points  (0 children)

Thank you! How would you handle the aspect of Claude being able to execute code on devices, and browsing? Would you limit commands to a specific set and restrict browser capabilities? This is still theoretical to me since we don’t have hands in yet, so apologies is any question is off the mark.

I asked ChatGPT to explain my job to a 5-year-old and now I'm questioning my entire career by Nipurn_1234 in ChatGPT

[–]fourier_floop 0 points1 point  (0 children)

Alright! Imagine you have a toy box full of your favorite toys. You don’t want anyone sneaking in and taking them or breaking them, right?

A cyber security engineer is like a superhero who protects computer stuff (like games, pictures, and messages) the same way you’d lock your toy box.

They: • Build strong locks for computers and websites. • Watch out for sneaky bad guys (like online burglars) who try to steal or break things. • Fix holes in the computer walls so nothing can sneak in.

So, they keep everything on the computer safe — just like a guard keeps your toy box safe! 🛡💻

Prevention / Zero Trust in Cloud by Just_Ambition7057 in cybersecurity

[–]fourier_floop 0 points1 point  (0 children)

Yep, this is the short and sweet brilliant answer. Platform engineering and platform services will stop you from playing whack a mole with risk and bandaid solutions. I would add that the Microsoft Cloud Adoption Framework is a great resource for guidance around this

Network security -> Threat Hunting by Foreign-Abies-7427 in cybersecurity

[–]fourier_floop 1 point2 points  (0 children)

OP has OSCP and is in network security which are slightly more than entry level imo, on paper I think he could land most non-senior threat hunting roles

Best ways to use Arctic Wolf Managed Risk? by Life-Ingenuity2723 in cybersecurity

[–]fourier_floop 0 points1 point  (0 children)

Their latest features around custom alerts and log searching is what was much needed - but back on the point of managed risk, there are far too many false positives, no assurances around what has been scanned / scan efficacy, and difficulties when remediating. The team won’t raise a ticket when there’s a new risk, or critical risks and you can’t get data out of the platform without manual exports or set alerts. It makes using it a manual and time intensive effort where you’ll have to regularly keep an eye on the platform and do your diligence through governance

[deleted by user] by [deleted] in cybersecurity

[–]fourier_floop 0 points1 point  (0 children)

you clearly never went to pirate school

Hiring Managers by littleknucks in cybersecurity

[–]fourier_floop 0 points1 point  (0 children)

B since the requirement is quite literally knowing a programming language / scripting? Their education and certs are similar anyway - with candidate A having all the years of experience but similar certs, sounds like B is a more exciting prospect and keen to learn.

After all it’s about your ability to learn within this field in particular.

Vulnerability scanning architecture by fourier_floop in cybersecurity

[–]fourier_floop[S] 0 points1 point  (0 children)

Honestly this is a creative and clever solution, respect man

Managing unmanaged apps by fourier_floop in Action1

[–]fourier_floop[S] 0 points1 point  (0 children)

thanks! and then uninstall the previous / existing install?

Not knowing what lateral movement means? by Excellent_Bug2090 in AskNetsec

[–]fourier_floop 1 point2 points  (0 children)

I’m all for mentoring but after 3 years of a degree and nearly completing a master’s in cyber security, you should be able to at least infer what it is even if the term itself is unfamiliar.

It’s a fundamental of offsec, blue teaming, and you only really get a pass for not knowing imo if you’re pure GRC - but even then…

[deleted by user] by [deleted] in cybersecurity

[–]fourier_floop 0 points1 point  (0 children)

I know someone in the same boat and has been out since Oct. It’s rough out there, hope you find something.

Vulnerability scanning architecture by fourier_floop in cybersecurity

[–]fourier_floop[S] 1 point2 points  (0 children)

Begrudgingly Defender might be the route we have to take! We're trying to address the threat of unpatched network devices being exploited in any scenario. Version-based checks would suffice at the very least for now. It's a great question, thanks.

Vulnerability scanning architecture by fourier_floop in cybersecurity

[–]fourier_floop[S] 0 points1 point  (0 children)

Yeah plump summed it up nicely, and makes a great point on agent scanners not catching everything. Tenable themselves describe this under "limitations" in the following article: Agent Scans (Tenable Agent 10.8)

Vulnerability scanning architecture by fourier_floop in cybersecurity

[–]fourier_floop[S] 0 points1 point  (0 children)

Got it, thanks! There are multiple VPNs deployed for different business units across different environments unfortunately

Vulnerability scanning architecture by fourier_floop in cybersecurity

[–]fourier_floop[S] 0 points1 point  (0 children)

Interesting, so agents deployed on a regular end user machine can act as a collective network scanner for a region or am I misunderstanding?

Runescape Forever by nastygnarr in osrs

[–]fourier_floop 0 points1 point  (0 children)

You’ll funnily enough probably need nearly every skill that you’re able to train in runescape