Secsolution · @secsolution
17 followers · 853 posts · Server mastodon.uno
Secsolution · @secsolution
16 followers · 831 posts · Server mastodon.uno

AIPSA, accordo tra Farnesina e "Security manager" per una maggiore sicurezza di chi lavora all’estero
Non sempre le imprese sono strutturate per garantire ai propri dipendenti la sicurezza quando si trovano a lavorare all’estero. Da questa consapevolezza...
zpr.io/WgDbaH89UHpB

#aipsa #associazioneitalianaprofessionistisecurityaziendale #securitymanager

Last updated 1 year ago

Secsolution · @secsolution
16 followers · 828 posts · Server mastodon.uno

AIPSA, accordo tra Farnesina e "Security manager" per una maggiore sicurezza di chi lavora all’estero
Non sempre le imprese sono strutturate per garantire ai propri dipendenti la sicurezza quando si trovano a lavorare all’estero. Da questa consapevolezza...
zpr.io/6eUS3ayNDbdX

#aipsa #associazioneitalianaprofessionistisecurityaziendale #securitymanager

Last updated 1 year ago

Nicolas Fränkel · @frankel
768 followers · 777 posts · Server mastodon.top
usbs-usa · @usbs_usa
33 followers · 331 posts · Server glasgow.social
Secsolution · @secsolution
11 followers · 345 posts · Server mastodon.uno

AAA cyber security specialist cercasi
La sicurezza di un paese non e’ solo fisica n solo cyber ed e’ strettamente legata alla capacita’ di lavorare in sinergia...
zpr.io/n6M9HQZWDiBT

#cybersecurity #aipsa #securitymanager

Last updated 2 years ago

Nicolas Fränkel · @frankel
745 followers · 509 posts · Server mastodon.top
Corelight · @corelight
84 followers · 23 posts · Server infosec.exchange

Imagine this. An advanced adversary has bypassed your perimeter defenses, moved inside your environment, and become a literal ghost in the machine. Undetected, the adversary is free to move from system to system, searching for its next target. This is a scenario that every fears and is a daunting challenge.

But this webcast demonstrates that don't need to go undetected. Learn how to overcome network blind spots and hunt, discover, and disrupt adversary attacks through a correlation of and platforms. If you're a threat hunter, incident responder, , , or , we encourage you to watch this technical webcast from Corelight and Cyborg Security:

👻 "Think Like a Threat Hunter: Hunting the Ghost in the Machine"

🎤 Corelight's Nick Hunter and Cyborg Security's Brandon Denker

▶️youtube.com/watch?v=QZkdOY412k

#soc #threathunting #cyberthreats #ndr #edr #SecurityAnalyst #securityengineer #securitymanager #securityArchitect #exploit #vulnerabilities #cyberattack #networksecurity #endpointsecurity #cybersecurity #dfir

Last updated 2 years ago