Detection Coverage and Detection-in-Depth

For some time, I’ve been also fascinated with the concept of detection-in- depth and a somewhat related concept of optimal detection coverage.
This fascination was born out of a particular type of analyst inquiry I used to get: if I have SIEM, do… Continue reading Detection Coverage and Detection-in-Depth

Deciding between MDR solutions offering endpoint agents with or without an additional network appliance?

There are a number of different Managed Security Service Providers (MSSPs) offering managed detection and response services. They tend to use what is called an endpoint agent, while only some use a network appliance in addition.

We have a… Continue reading Deciding between MDR solutions offering endpoint agents with or without an additional network appliance?

Endpoint Detection and Response: Securing Your Borders

The post Endpoint Detection and Response: Securing Your Borders appeared first on CCSI.
The post Endpoint Detection and Response: Securing Your Borders appeared first on Security Boulevard.
Continue reading Endpoint Detection and Response: Securing Your Borders

What are the main differences between a covert timing channel and a covert storage channel?

I am trying to find the differences between a covert timing channel and a covert storage channel in terms of detectability, performance, features, and any other advantages and disadvantages.

Is there any resource that directly compares t… Continue reading What are the main differences between a covert timing channel and a covert storage channel?

Is there any method or tool other than nmap for the detection of an OS?

I wanted to know if there was any other way to detect the OS of a network (other than nmap) since nmap doesn’t detect most versions of Windows 10 at all and identifies them as a different OS altogether or as a different versi… Continue reading Is there any method or tool other than nmap for the detection of an OS?

Detecting Water Before it’s Too Late

[mcu_nerd] is like any engineer, which is why his problem of an occasionally leaky water heater sure looks like a research project with no end in sight. Sure there’s probably a commercial product out there that can be had for half the cost and a few clicks of the mouse, …read more

Continue reading Detecting Water Before it’s Too Late

How can I as middleman verify whether a phishing site is valid if the scam listens only on the referrer link and blocks any other access methods?

How can I as a trusted user of a middleman company (such as PhishTank) verify whether a phishing site is valid if the scam listens only on a unique referrer link(randomly created) and is blocking any other access methods?

To… Continue reading How can I as middleman verify whether a phishing site is valid if the scam listens only on the referrer link and blocks any other access methods?