191
you are viewing a single comment's thread
view the rest of the comments
[-] navigatron@beehaw.org 10 points 2 years ago

What!

How many of these devices do we have in our asset inventory? Do they have a cvss score yet? Let’s just do it ourselves with an ssvc score. Can this be exploited remotely? Call crowdstrike, tell them to get a network detection written and deployed. How long do we have before the quarterly audit? Can our soc do threat hunts against this? Get me the RTOs, RPOs, and business impact assessment. Let’s MOVE, people!

this post was submitted on 21 Nov 2023
191 points (100.0% liked)

196

17884 readers
455 users here now

Be sure to follow the rule before you head out.


Rule: You must post before you leave.



Other rules

Behavior rules:

Posting rules:

NSFW: NSFW content is permitted but it must be tagged and have content warnings. Anything that doesn't adhere to this will be removed. Content warnings should be added like: [penis], [explicit description of sex]. Non-sexualized breasts of any gender are not considered inappropriate and therefore do not need to be blurred/tagged.

If you have any questions, feel free to contact us on our matrix channel or email.

Other 196's:

founded 2 years ago
MODERATORS