Become a member
Sign in
dmontague
dmontague

dmontague

14 Following
2 Followers
  • Profile
  • Claps
  • Highlights

Highlighted by dmontague

See more

From A Beginner-Friendly Introduction to Containers, VMs and Docker by Preethi Kasireddy

…ker container can make syscalls to the host kernel, which creates a larger surface area for attack. When security is particularly important, developers are likely to pick VMs, which are isolated by abstracted hardware — making it much more difficult to interfere with each other.

From Give Good the Advantage by Stephen Gillett

… worth investigating — but in a day’s work, they’re lucky if they can review a few hundred of them. Conversely, many investigations are hampered by the gaps in available information, simply because the cost of storing all the relevant data is increasing far faster than a typical organization’s budget.

From Give Good the Advantage by Stephen Gillett

Thousands of potential clues about hacking activity are overlooked or thrown away each day. At large companies, it’s not uncommon for IT systems to generate tens of thousands of security alerts a day. Security teams can usually filter these down to about a few thousand they think are worth investigating — but in a day’s work, they’re lucky if they can review a few hundred of them. Conversely, many investigations are hampered by the gaps in available information, simply because …

Claps from dmontague

See more

But what if my password manager gets hacked?!

Jessy Irwin

How To Hide Your Ports With Port Knocking

Shivam Singh Sengar

Give Good the Advantage

Stephen Gillett