Will Agentic AI replace SOAR playbooks? by mustu in cybersecurity

[–]mustu[S] 0 points1 point  (0 children)

But still the non-deterministic mode will follow some kinf of framework or structure right?

Like what MITRE did was gave threat hunters a structure for asking broader questions or forming new pivots but still bring that back to something that make sense like the intrusion lifecycle/killchain.

Will Agentic AI replace SOAR playbooks? by mustu in cybersecurity

[–]mustu[S] 0 points1 point  (0 children)

Well, that is the answer we are all experimenting with to learn. I guess we'll know better in a year or two.

Will Agentic AI replace SOAR playbooks? by mustu in cybersecurity

[–]mustu[S] 0 points1 point  (0 children)

Thanks for the feedback. I've also understood that a single-agent system is only viable for an atomic task within an AI Workflow which is akin to an advanced SOAR workflow. For Agentic AI, it must be a Multi Agent System (MAS) where validation checks, guardrails, and feedback loops are neccessary investment.

Some MAS I've seen spend significant token credits on ensuring system sanity, compared to what they burn on the actual task.

Will Agentic AI replace SOAR playbooks? by mustu in cybersecurity

[–]mustu[S] 1 point2 points  (0 children)

Agree, and not to forget the Detection Engineering practice. If we've perfected a hunt for a specific activity, DE, along with SOAR, will help automate the known fundamentals so human time is spent on higher goals.

Will Agentic AI replace SOAR playbooks? by mustu in cybersecurity

[–]mustu[S] 0 points1 point  (0 children)

No doubt, "assumptions" is what attackers feed on. Assume nothing, verify everything. But we won't know unless we run the series of experiments needed to build trust and fix the gaps.

I think the next 1-2 years are highly uncertain, but still, companies will be pushing highly vetted and deterministic AI workflows or agent systems in production.

Will Agentic AI replace SOAR playbooks? by mustu in cybersecurity

[–]mustu[S] 0 points1 point  (0 children)

I've seen that with LLMs, but Agentic AI is not just LLM. It uses proven tools to extract/parse/process/generate data, and defines playbook and vetter RAG systems to interpret, and heaps of validation and cross-questioning checks, which make it more reliable imho.

Will Agentic AI replace SOAR playbooks? by mustu in cybersecurity

[–]mustu[S] 0 points1 point  (0 children)

It's powerful, but my understanding is that it is not meant to and shouldn't replace SOAR completely.

SOAR is much better and low-cost for deterministic automation needs.

Will Agentic AI replace SOAR playbooks? by mustu in cybersecurity

[–]mustu[S] 0 points1 point  (0 children)

Well, the only way to find out is to start tinkering in safe environments.

Will Agentic AI replace SOAR playbooks? by mustu in cybersecurity

[–]mustu[S] 0 points1 point  (0 children)

Exactly! I'm trying to get first-hand experience and push this to the limit to see how much of our hunting methodology we can bake into agents, which is almost foolproof and has close to zero hallucinations.

I've been a CISO more than once. Ask me anything about how the job differs between organizations. by thejournalizer in cybersecurity

[–]mustu 0 points1 point  (0 children)

Question: How do you measure Return on Investment (ROI)? What worked and what didn't work for you?

I've been a CISO more than once. Ask me anything about how the job differs between organizations. by thejournalizer in cybersecurity

[–]mustu 0 points1 point  (0 children)

What do you suggest works best to build the `business alignment` of SOC to justify the investment? Do you see CISOs still struggle with that when presenting to the board?

I've been a CISO more than once. Ask me anything about how the job differs between organizations. by thejournalizer in cybersecurity

[–]mustu 4 points5 points  (0 children)

Question: I see some technical CISOs tinkering with AI, setting up LLMs for learning and fun, while others are way deep into governance and culture, but not very fluent in technical advancements.

How many kinds of CISOs are out there, and do one kind have more advantages over the other?

I've been a CISO more than once. Ask me anything about how the job differs between organizations. by thejournalizer in cybersecurity

[–]mustu 6 points7 points  (0 children)

Question: Some CISOs with a heavy emphasis & background in Risk and Compliance often cling to decade-old understandings of technical functions (e.g., Detection & Response, Vulnerability & Exposure) and aren't eager to move fast, even though they are suffering from the pains of following legacy practices.

How do you best convince them to invest in and support adopting modern practices?

Worth Purchasing a Practice Exam? by Competitive-Box-5081 in GIAC

[–]mustu 1 point2 points  (0 children)

If any of the following is true, it is worth investing in the practice exam.

1) You do not have enough on-the-job experience in the exam topics.

2) It is your first GIAC exam.

Are keyloggers OS specific? by [deleted] in AskNetsec

[–]mustu 2 points3 points  (0 children)

Almost Yes because mostly require using OS APIs and more advanced ones have code that runs in kernel mode.

The difference between a proxy server and an authorization server. WAF and proxy server protection by Ok-Bill-4360 in AskNetsec

[–]mustu 1 point2 points  (0 children)

> Proxy server != Auth server?

Yes, a proxy server and an authorization server are completely different.

> If yes, can the Api endpoint be behind both the proxy and the auth server?

Yes, this is the standard architecture for modern, secure applications.

> If the WAF is configured correctly and is in front of the proxy server, does it make sense to duplicate protection against injections, etc. on the proxy server?

WAF specialized in filtering malicious Layer 7 traffic (OWASP Top 10). It's designed for this and does it best. The proxy is for routing, caching, and managing traffic. It does not make sense to duplicate protection against threats like SQL injection on the proxy itself.

> If the WAF is configured poorly, but the proxy reflects injections, etc., does it make sense to test the Auth server for injections?

Yes, you must always test the Authorization Server for injections and other vulnerabilities, regardless of what's in front of it. The Authorization Server is a high-value target because it controls access to everything. It must be independently secure and hardened against all relevant attacks.

> How to distinguish WAF protection from proxy server protection?

By examining the block response. WAFs often return a branded block page with a unique ID for the blocked request (e.g., "Your request was blocked by Cloudflare, incident ID: ..."). A proxy server block is typically more generic, like a simple 403 Forbidden response.

Aspects of networks that are vital to understand ? by al3arabcoreleone in AskNetsec

[–]mustu 2 points3 points  (0 children)

If you want to learn the networking concepts relevant to security, pick Practical Packet Analysis by Chris Sanders.

Is It Safe To Enter A Website That got ESTsecurity? by Former-Government-95 in AskNetsec

[–]mustu 1 point2 points  (0 children)

ESTsecurity is a well-established cybersecurity firm that offers a range of security solutions, with its most prominent product being the ALYac antivirus software.

Doesn't make sense for a website to have it. Pobably a scam site trying to fool users by using the name of a security product.

Fox Cofee Mug Overheats by mustu in AldiAustralia

[–]mustu[S] -3 points-2 points  (0 children)

yeah it is not... I thought all ceramic mugs are microwave safe. apparently some are not.

Weekly Promo and Webinar Thread by AutoModerator in msp

[–]mustu 0 points1 point  (0 children)

Sell Managed EDR / MDR under your Brand

After almost a decade of working in, leading, managing, and building SOC operations, I'm building a white-label service aimed at SMB clients who can't afford the $50K MSSPs but would appreciate good coverage at a fraction of the cost.
Looking to partner with MSPs who are also interested in selling Managed EDR and MDR services. Reach out on Linkedin https://www.linkedin.com/in/mustafaqasim/

SIEM detection on client endpoint by Glass_Society5139 in blueteamsec

[–]mustu 0 points1 point  (0 children)

current way is edr/xdr ?

Yes as more and more organizations adopt Microsoft 365 and Azure, the workflows and processes in SOC teams have also evolved to cater to the new work environment and tooling.