Insights from NSA’s Cybersecurity Threat Operations Center

  Рет қаралды 32,717

RSA Conference

RSA Conference

Күн бұрын

Пікірлер: 3
@novo7867
@novo7867 3 жыл бұрын
Nice work amazing thinking
@shaungrace9745
@shaungrace9745 5 жыл бұрын
Last thought. Social media creates blocks of everything, fundamentally. It means it's slower to load each block but perhaps software needs to slow down and be blocks of code/data. Easier to track etc and AI can use search parameters easier as eliminates words it doesn't have to scan.......But then actors might A.I. more blocks but that show up like a heard of giraffes in computer land - device lands
@shaungrace9745
@shaungrace9745 5 жыл бұрын
If 90% is dumb practice and much is email etc. Then place all questionable information in a folder and have the user agree that they incur any costs when looking through all this junk. And they must look at it & delete or they get a fee to hold it somewhere DoD not sure how u'd fine them for opening dumb email? And on each cyber (questionable) material. Use mass flow. Oh this is where it was from the user will say? Approved software with 1-10 star rating. Each star is result of a technical group who was employed to try and hack it before release. However 1-10star hack rating will also occur. There is so much money they could pay these star groups to release info as they try to break in for the good guy. Kinda need honest star groups and only 20 of, with all their info sent and paths checked in real time. Last. A human body has defense where the attack is always inside but neutralised. In most cases. So what if you had video of what not to do. Let people do the learning. SImple recordings of screen with evident bad mouse clicks and bad content
The Fallacy of the "Zero-Trust Network"
44:18
RSA Conference
Рет қаралды 55 М.
How to Make Sense of Cybersecurity Frameworks
40:24
RSA Conference
Рет қаралды 33 М.
How Strong is Tin Foil? 💪
00:25
Brianna
Рет қаралды 72 МЛН
Haunted House 😰😨 LeoNata family #shorts
00:37
LeoNata Family
Рет қаралды 15 МЛН
ТЫ В ДЕТСТВЕ КОГДА ВЫПАЛ ЗУБ😂#shorts
00:59
BATEK_OFFICIAL
Рет қаралды 3,9 МЛН
How To Choose Mac N Cheese Date Night.. 🧀
00:58
Jojo Sim
Рет қаралды 80 МЛН
Peek into the Future: The Security Operations Center of 2020
26:34
RSA Conference
Рет қаралды 24 М.
The Cutting Edge of Classified: Research at NSA
40:45
National Security Agency
Рет қаралды 13 М.
From SIEM to SOC: Crossing the Cybersecurity Chasm
30:18
RSA Conference
Рет қаралды 20 М.
No Such Agency: The NSA Explained
51:23
The Aspen Institute
Рет қаралды 21 М.
How the NSA used radio waves to spy on offline computers
7:58
PBS NewsHour
Рет қаралды 9 М.
Threat Hunting in Security Operation - SANS Threat Hunting Summit 2017
27:39
SANS Digital Forensics and Incident Response
Рет қаралды 41 М.
Cybersecurity Architecture: Who Are You? Identity and Access Management
31:15
Security Operations 2018: What Is Working? What Is Not.
52:53
RSA Conference
Рет қаралды 14 М.
Conducting a cybersecurity risk assessment
52:42
IT Governance USA Inc.
Рет қаралды 89 М.
How Strong is Tin Foil? 💪
00:25
Brianna
Рет қаралды 72 МЛН