From one ID to another, very nice consumable info nugget!!
@JarrodKoehler-n1tАй бұрын
Mills River
@KishorKumar-z8e2 ай бұрын
thanks a lot for valuable video please keep doing such a videos very informative. thanks again.
@ABDULBASIT-q8m7f2 ай бұрын
what is the software used @ 7.50 ?
@Ray-p8d3 ай бұрын
How to resolve this one?
@izumizhang96803 ай бұрын
does this potentially offend privacy?
@claudiamanta19436 ай бұрын
Can a threat- detecting software itself constitute a threat? A hacker would mess with your algorithmic architecture so that the client becomes a victim by being lulled into a sense of false security and by over reliance on- basically, another piece of software that, like any piece of software- is hackable.
@claudiamanta19436 ай бұрын
2:38 So…you say that cloud is a good idea. Say no more. ✋ You just discredited you and your company in my non- specialist eyes. Even if a service is ‘just’ IsaaS, it’s anything but secure.
@claudiamanta19436 ай бұрын
1:57 I think this is BS. Who would have allowed him to do this? And who can claim it was just gross negligence when it shows clear intent and planning? I doubt that employees at DoD or similar institutions unscrew computers on a regular basis and put them in their lunch boxes, casually waltzing through the gate’s metal detectors.
@claudiamanta19436 ай бұрын
Thanks for sharing, it’s really interesting. I don’t know much about IT, but isn’t it risky to use any automated system to flag up problems? Such system is only as good as its algorithms and the way the administrator configures it. Re the incident. Maybe this lady works remotely from Ukraine? Last but not least, shouldn’t the company’s IT admin check her activity? Please, tell me that Admins can do that despite the employees using VPN, otherwise the system would be safe-ish from external attacks but totally vulnerable to internal attacks. Thanks.
@claudiamanta19436 ай бұрын
3:45 How do you know info about somebody’s behaviour if they use a VPN?
@sielecassharpe6787 ай бұрын
As a new soc analyst, I found this video very valuable! I got so much insight in such a short amount of time as well as how you should investigate and look into activities. Thanks a ton!
@tinatwintinny12057 ай бұрын
Thank you for sharing. I have been trying to get an entry-level job as a SOC, and 😐it's an exciting role.
@juliusweston80368 ай бұрын
Awesome Stuff!
@harshal070519958 ай бұрын
How can we implement ueba in our firm
@neonpolo8 ай бұрын
great video, gives you insight on how attackers think
@joemorgan22538 ай бұрын
Thank you. That's an eye opening demonstration.
@SkygirlGamingChannel8 ай бұрын
Thank you a lot for this in depth video.
@jeffnaval48948 ай бұрын
It looks simple. not too much coding. Finally i have a dreamjob i'm dreaming about.
@dylanlee84769 ай бұрын
The mic almost made me deaf
@SreeProshntoBiswas9 ай бұрын
Hi there, Develop your business quickly, You need an efficient Social Media Market. I want to read about the application of that skill in your business. And want to see your success as a result. I will be very happy to be with you.
@SreeProshntoBiswas9 ай бұрын
Hi there, Develop your business quickly, You need an efficient Social Media Market. I want to read about the application of that skill in your business. And want to see your success as a result. I will be very happy to be with you.
@Poorselipitanoff9 ай бұрын
Привет с двача
@akpologun66549 ай бұрын
Wow, this is amazing, I'll try this out
@jackchn2310 ай бұрын
Thanks Keatron! Subbed to YOUR channel!
@ishwaryanarayan101011 ай бұрын
Sir your videos are great . I am looking for trial version to update my skills . Do you offer free trial version?
@gavinreynolds942 Жыл бұрын
Thank you for uploading these videos. Could you please add a video or series discussing how tokenize using regex. I am not understanding the Tokenization Parameter Requirements.
@priyankakale8652 Жыл бұрын
Thanks for such an informative video.
@toliskoutovas7267 Жыл бұрын
Trying to get into SOC T1. What if instead of uploading the rootkit executable on VirusTotal, you instead extracted its hash and compared it to the virustotal database? Wouldn't that be safer?
@daveclark9411 Жыл бұрын
Promo`SM 🤤
@draperw86 Жыл бұрын
Dang Keatron you break it down like this was a sermon !! This is awesome
@zak1686 Жыл бұрын
Thank you %100 works
@xCheddarB0b42x Жыл бұрын
This was excellent: short, informative, and clear. Thank you!
@daslynhug8953 Жыл бұрын
Whew would recommend this video to anyone! Thank you for a value add!
@MinaBrinzo Жыл бұрын
Didnt work for me
@akotamaki3385 Жыл бұрын
Great video thank you
@stocktip8030 Жыл бұрын
I have a question: i am the only one at home. i have 2 laptops. i remotely connected to my other laptop (RDP) and locked it and i kept my terminal window minimized. when i switched back to it, i found it unlocked. what could have caused that?
@rb-os4cm Жыл бұрын
Very Interesting topic. Will UBA work effectively by just ingesting from an IAM tool and application access logs ?
@rohithreddy7695 Жыл бұрын
Simple and straight
@rohithreddy7695 Жыл бұрын
thanks mate
@rohithreddy7695 Жыл бұрын
great explaination...cheers mate
@jksalamon Жыл бұрын
Wanted to check on SOC. Can there be an IT SOC and an OT SOC. Is it right to say so. Or is it just one SOC and have a SIEM separately for IT and OT. In one of our groups we had this endless debate about SOC, each side backed with their own experience and opinions. What do you think is the right approach, any document/whitepaper you can share that you know of.
@zacherymahoney12 Жыл бұрын
Just super cool. This is why its so fun
@fromthemoonandmybed Жыл бұрын
Watching this in 2023 and seeing 3:55 is wild 😭
@Hotchoclate5444 Жыл бұрын
Great video!!
@ankaarao123 Жыл бұрын
Thanks to everybody for a lovely video
@TestUser-i6z Жыл бұрын
SuperCybex can provide a cyber defense services for businesses with 50-5000 employees throughout the US to help identify cyber threats and mitigate the risks. Whether your business needs firewalls, network upgrades, or cyber defense and training, we can provide a complete solution including Incident Response