There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

wop ,
@wop@infosec.pub avatar

I am currently transitioning into a Security role at work. One question would be: what are the must-have tools for every blue team?

  • Vuln-Scanner
  • Logging/ SIEM-Server
MSgtRedFox ,
@MSgtRedFox@infosec.pub avatar

Here are some platitudes for you without knowing your life:

Learn concepts and not tools. Email links are your number one threat. Unpatched software is your number two threat.

You cannot defeat them, just slow them down.

Consider:

Go download NIST cyber security frameworks, read it. It’s boring as hell, but tells you what the security program should do and checklists of things to cover.

Go Google DISA STIGs. You can download free GPOs and checklists that lock down about everything you have. Some are not public, most are. There’s a CIS equivalent, also.

Implement system tiers, it’s well documented, but hugely painful. No domain admins (DA) on anything but tier 0, no DAs or SAs on workstations.

Tenable Nessus is an example of vulnerability scanner.

Security Onion is an example of IDS.

MSgtRedFox ,
@MSgtRedFox@infosec.pub avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • [email protected]
  • lifeLocal
  • goranko
  • All magazines