Vollans · @stephen
222 followers · 962 posts · Server mastodon.motorsport.org.uk

What I find fascinating about the DNS level blocks on my home network is not the amount of advertising, malvertising and general tracking rubbish, which I expected, and the Apple stuff which I also expected as I have a lot of Apple products and services, but that Amazon Alexa and Netflix are 5th and 6th - and I don’t have a single Alexa device or service enabled by me, and I don’t have a Netflix account.

#networksecurity #networksecuritymonitoring #privacy #networkprivacy

Last updated 1 year ago

Richard Bejtlich · @taosecurity
2225 followers · 240 posts · Server infosec.exchange

Over three years ago, Andy Greenberg interviewed me for his story on the godfather of computer , . It features quotes from the godfather of as well, @toddheberlein. wired.com/story/meet-the-mad-s

#incidentresponse #cliffstoll #networksecuritymonitoring

Last updated 2 years ago

Richard Bejtlich · @taosecurity
2165 followers · 197 posts · Server infosec.exchange

This is what I think of when I hear cries for "better detection." This photo dates from 23 Aug 2002. I think it was a vendor showing an IDS attached to a stoplight. Yes, we all want better detection, but if we could reliably detect it, we would prevent it. endures because there will always be events that evade detection.

#networksecuritymonitoring

Last updated 2 years ago

Richard Bejtlich · @taosecurity
2165 followers · 197 posts · Server infosec.exchange

This is what I think of when I hear cries for "better detection." This photo dates from 23 Aug 2002. I think it was a vendor showing an IDS attached to a stoplight. Yes, we all want better detection, but if we could reliably detect it, we would prevent it. exists because there will always be events that evade detection.

#networksecuritymonitoring

Last updated 2 years ago

Richard Bejtlich · @taosecurity
2165 followers · 197 posts · Server infosec.exchange

This is what I think of when I hear cries for "better detection." This photo dates from 23 Aug 2002. I think it was a vendor showing an IDS attached to a stoplight. Yes, we all want better detection, but if we could reliably detect it, we would prevent it.

#networksecuritymonitoring

Last updated 2 years ago

Richard Bejtlich · @taosecurity
2061 followers · 144 posts · Server infosec.exchange
Richard Bejtlich · @taosecurity
2061 followers · 144 posts · Server infosec.exchange

@crowdstrike has selected the sensor built by my company @corelight for their , , and services. I'm pleased that Crowdstrike customers will benefit from our offering and that Crowdstrike promotes NSM as a core service. corelight.com/company/coreligh

#incidentresponse #compromiseassessment #networksecuritymonitoring

Last updated 2 years ago

Richard Bejtlich · @taosecurity
2033 followers · 135 posts · Server infosec.exchange

I'd like to commend 3CORESec for their excellent TestMyNIDS scripts. They're my go-to when deploying a new sensor. github.com/3CORESec/testmynids

#networksecuritymonitoring

Last updated 2 years ago

Richard Bejtlich · @taosecurity
2033 followers · 135 posts · Server infosec.exchange

I'd like to commend 3CORESec for their excellent TestMyNIDS scripts. They're my go-to when deploying a new sensor. github.com/3CORESec/testmynids

#networksecuritymonitoring

Last updated 2 years ago

Marko Jahnke · @markojahnke
98 followers · 302 posts · Server bonn.social

Unfortunately, 7 does not compile on 11 bullseye due to an older version.

But since debian 12 bookworm is on its way, I hope to be able to compile it by the summer this year.

#suricata #debian #rust #opensource #networksecuritymonitoring #ids

Last updated 2 years ago

Richard Bejtlich · @taosecurity
1982 followers · 125 posts · Server infosec.exchange

@zeek matters because it is literally the codification of the security principle "prevention eventually fails."

Defenders often do not know how adversary activity will specifically manifest on the network.

By summarizing traffic, extracting key data, and deriving insights, Zeek provides the network evidence defenders need to interdict intruders before they accomplish their mission.

Note: Zeek offers 2 of 4 elements of data (transaction logs and extracted files). also requires alerts and pcap. Furthermore, NSM data works with third party sources, infrastructure/application logs, and endpoint data.

#networksecuritymonitoring #nsm

Last updated 2 years ago

Richard Bejtlich · @taosecurity
1827 followers · 101 posts · Server infosec.exchange

I’m pleased to see two of my books available for borrowing on the @internetarchive.
I’m especially glad my first book, The Tao of , is there. archive.org/details/taoofnetwo
When I signed the contract in 2003 I was like every other newbie author who didn’t understand or appreciate the value of keeping my own copyright.
Ten years later when I worked with @nostarch, they assigned me copyright automatically. That book, the Practice of Network Security Monitoring, is also available to borrow. archive.org/details/practiceof

#networksecuritymonitoring

Last updated 2 years ago

Richard Bejtlich · @taosecurity
1833 followers · 103 posts · Server infosec.exchange

I’m pleased to see two of my books available for borrowing on the @internetarchive.
I’m especially glad my first book, The Tao of , is there. archive.org/details/taoofnetwo
When I signed the contract in 2003 I was like every other newbie author who didn’t understand or appreciate the value of keeping my own copyright.
Ten years later when I worked with @nostarch, they assigned me copyright automatically. That book, the Practice of Network Security Monitoring, is also available to borrow. archive.org/details/practiceof

#networksecuritymonitoring

Last updated 2 years ago

Richard Bejtlich · @taosecurity
1827 followers · 101 posts · Server infosec.exchange

I’m pleased to see two of my books available for borrowing on the @internetarchive.
I’m especially glad my first book, The Tao of , is there. archive.org/details/taoofnetwo
When I signed the contract in 2003 I was like every other newbie author who didn’t understand or appreciate the value of keeping my own copyright.
Ten years later when I worked with @nostarch, they assigned copyright automatically. That book, the Practice of Network Security Monitoring, is also available to borrow. archive.org/details/practiceof

#networksecuritymonitoring

Last updated 2 years ago

Richard Bejtlich · @taosecurity
1470 followers · 71 posts · Server infosec.exchange

This is...odd. On Christmas Day, 19 years ago (2003!), I was troubleshooting trying to compile what was then called Bro on my 4.9 system. I was probably working on The Tao of , which I published the next summer. These days you can use the FreeBSD ports tree or packages to install @zeek. mailman.icsi.berkeley.edu/pipe

#freebsd #networksecuritymonitoring

Last updated 2 years ago

Richard Bejtlich · @taosecurity
1416 followers · 59 posts · Server infosec.exchange

If you're a fan of you'll be happy to hear that the premieres of our last videos will occur next week, meaning all recording sessions will be public. Check out the playlist here: youtube.com/playlist?list=PL2E

#networksecuritymonitoring #ZeekWeek

Last updated 2 years ago

Richard Bejtlich · @taosecurity
1416 followers · 59 posts · Server infosec.exchange

My book is part of a that started yesterday. If I'm reading it right, you can pay as little as $1 to get the digital copy. humblebundle.com/books/hacking

#nostarch #networksecuritymonitoring #humblebundle

Last updated 2 years ago

📰 Hot off the press 📰
---------------------------------------
I wrote this article for PowerGrid International magazine and it is to help folks with tuning their ICS /OT / SCADA network security monitoring alerts. 🛠️📉 You don't have to reinvent the wheel!

***If ICS NSM is in your responsibility, please read this article (link below) I would love to get your feedback.***

Documentation about tuning ICS NSM systems are rare. ICS NSM solution documentation tends to focus on how to turn on and off the baseline feature, and not go into specifics about how to fine tune the system.

If you buy an ICS NSM solution and forget it, it will be useless. If a vendor says their sensor/IDS requires no tuning, they are lying to you. An unmanaged and untuned ICS NSM or IDS will create floods of alerts, nuisance alerts, and contributes to alert fatigue for your engineers and SOC analysts.

Thank you!

📰: When fine-tuning your cybersecurity alerts, it’s best to focus on the basics
power-grid.com/td/when-fine-tu

#ics #ot #scada #icssecurity #otsecurity #networksecuritymonitoring #nsm #ids #soc #socanalysts #blueteam #tuning

Last updated 2 years ago

📰 Hot off the press 📰
This article is to help folks with tuning their ICS network security monitoring alerts. 🛠️📉 You don't have to reinvent the wheel, because you can leverage your control system alarm tuning methodology.

When fine-tuning your cybersecurity alerts, it’s best to focus on the basics power-grid.com/td/when-fine-tu from PowerGrid International.

#icssecurity #otsecurity #networksecuritymonitoring #tuning #intrusiondetection #siem

Last updated 2 years ago