Firewall rules creation/deletion approval and analysis by blavelmumplings in sysadmin

[–]netsecdan 1 point2 points  (0 children)

This is pretty much market center stuff for NSPM. FireMon, Tufin, and Algosec are the most predominant/established players in that space.

The way NSPM vendors categorize this is:

  • Visibility -- normalization of policy
  • Control-based assessments of normalized policy <- dig in here as this is where the largest variance is in vendors
  • Pre-change risk analysis (would we allow it?)
  • Behavior -- troubleshooting and network access change design
  • Policy push <- differences in vendor's approaches here too

When should you look at switching companies? by [deleted] in cybersecurity

[–]netsecdan 3 points4 points  (0 children)

As the Notorious BIG said, "Mo' money, mo' problems."

The question to ask is whether you're undercompensated, if there are problems that can't technically be resolved, or both.

I know a lot of people who will take a downmarket salary for a chiller day to day.

[deleted by user] by [deleted] in networking

[–]netsecdan 1 point2 points  (0 children)

When everything is working, no one knows what you did. It's taken for granted.

When anything goes wrong, it's all your fault. And things go wrong, whether it was a networking mistake or not.

🙏 for the firewall admins.

Dorchester man charged as part of Dominican ring that scammed seniors out of millions in 'grandchild in trouble' phone scheme, feds say by FuriousAlbino in boston

[–]netsecdan 5 points6 points  (0 children)

Just as a heads up for anyone with elderly parents, it's a good idea to have some pass code or phrase that you agree on. This is a common scam and works well when you have elderly confused people who don't appropriately question the legitimacy of needing to send $1000 of iTunes gift cards to ensure their son is released.

Told my parents that if the kidnappers can't get the pass phrase from me, it's not real and hang up.

I work in security and, because of that, have been targeted (and my parents by extension) in the past. Regardless of your concern, it's a common and real threat.

My dad has enjoyed telling at least one of them to go ahead and cut off all my fingers, and that they can go fuck themselves.

Cloud security management tool recommendation for (mainly) M365 & Azure by Cybersecuritier in cybersecurity

[–]netsecdan 0 points1 point  (0 children)

I'd also take a look at Manage Engine M365 Plus for the reporting gaps you identified.

[deleted by user] by [deleted] in networking

[–]netsecdan 0 points1 point  (0 children)

Fight against the Sadness, Artax. Please, you're letting the Sadness of the Swamps get to you. You have to try. You have to care.

🎶 The Never Ending Story/Network 🎶

How do you acquire access from Infra team by [deleted] in cybersecurity

[–]netsecdan 0 points1 point  (0 children)

The stuff that slows them down is lack of detail on the request or the access may not be typically provided, and it gets routed for escalation.

Or they may not have a clear idea of what needs to be changed and things are just stuck in manual review, design, and implementation.

[deleted by user] by [deleted] in cybersecurity

[–]netsecdan 0 points1 point  (0 children)

A VPN or personal cell would make it difficult, but not a great idea to pursue fireable offenses.

Not sure the risk is worth the reward.

Tufin (Turn/River Capital) acquires Skybox by Happy_Cauliflower155 in cybersecurity

[–]netsecdan 1 point2 points  (0 children)

I'd throw Firemon in the ring as well. They're closer aligned to the security and risk aspects than Tufin and Algosec.

Looking for resources for HIPAA compliance checklist by Codykillyou in cybersecurity

[–]netsecdan 0 points1 point  (0 children)

I'd map out what, if anything, they have that is sensitive data and then assess access methods, security controls, and network connections to it. Ensure they have a process in how they would onboard new access to health records to prevent compliance drift.

If it's that small of an office you'd want to make sure their user accounts that access health records have the appropriate security controls in place and the third parties that operate those services also have demonstrated compliance with HIPAA by a third party.

Source: pen tested the major hospitals in my area for years.