TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Blue teams, what has had the most impact protecting against cyber attacks?

20 pointsby alltakendamnedover 5 years ago
Security blue teams or defenders of HN, what were the changes you made that have had the most impact in improving the resilience of your organisation to cyber attacks ?

9 comments

jestersonover 5 years ago
Maybe someone will disagree, but I believe there is no shortcuts or one-fits-all solution when it comes to security. Structure of modern information systems is extremely diverse making single path approach not working in vast majority of cases.<p>My answer would be quite boring I guess but it does the job to improve resilience:<p>- Analyse your system and identify potential vulnerabilities; - Analyse you vulnerabilities against your risk model (identify the most crucial ones); - Mitigate risks from most important to least one; - Rinse, repeat regularly;
评论 #20753602 未加载
badrabbitover 5 years ago
1) Implement a good EDR solution. By far, I can&#x27;t think of any other change or investment that has had better ROI. So much visibility! And you can quickly implement detections and controls based on attacker TTP which has a greater ROI than playing whack-a-mole with CVEs or rely on updated firewall rules,av rules,selinux rules,etc...<p>2) Log as much as possible and do something with the logs. Log everything and continue to improve your SIEM or security stack based on new threat intel.<p>3) Low effort,high ROI low hanging fruits. 2FA everything. Mutual certificate auth where i can. Turn on bitlocker. Make people use password managers,ssh pubkey auth. If you have typical corporate firewall&#x2F;proxy: block any domain that isn&#x27;t categorized or newly registered.<p>4) this is what I think will be good ,haven&#x27;t done it IRL: segment network well. Remote management can only happen from jump boxes. Be hostile against removable drives. 5) Taking first step of NIST&#x27;s incident response lifecycle seriously,preparation: Playbooks(Online and Offline),checklists,emergency communication channels. Document important assets and related contact when SHTF. And actually have a routine table top excercises and penetration tests (as the corporate wallet allows)<p>6) I hate that I put this last,but: good security tooling. Typical stuff like an in-house sandbox,dedicated DFIR platform.<p>This should go without saying: you need people to do this and it really does start from the top (leadership).
评论 #20757318 未加载
moviuroover 5 years ago
- Keep up with the latest trends (supply chain, credential leaks, etc.) and published CVEs (a CERT can help)<p>- Risk analysis with business stakeholders (maybe they care nothing for confidentiality, but tons for integrity, or there are market regulations a security expert has no knowledge of)<p>As said by jesterson, there&#x27;s no silver bullet in security, only adequate counter-measure given a threat model.
评论 #20753611 未加载
netsectodayover 5 years ago
Practice some red team exercises against your apps and infrastructure, or do it against a site in the wild and responsibly disclose what you found to them - then harden your systems against your tactics.
评论 #20753625 未加载
dieFledermausover 5 years ago
Title is lacking the &quot;Ask HN:&quot; preface which probably explains the low response&#x2F;activity.
espeedover 5 years ago
Here&#x27;s a new one most aren&#x27;t thinking about yet...<p>Set up live early warning system for spoofed&#x2F;deep fake news feeds <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=20748195" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=20748195</a>
Spooky23over 5 years ago
The key is basic competence in configuration management, siem and most importantly segmentation.<p>Patch and have configuration standards.<p>Segmentation is harder. Keep systems separated and minimize admin privilege.
runjakeover 5 years ago
Continuous, ongoing end user education, by far.<p>It must be a regular thing. Threats change, people forget, people lower their guard.
评论 #20760479 未加载
thedevindevopsover 5 years ago
<a href="https:&#x2F;&#x2F;giphy.com&#x2F;gifs&#x2F;wolf-gladiators-vulcan-l3mZ95PCx30MxbW3C" rel="nofollow">https:&#x2F;&#x2F;giphy.com&#x2F;gifs&#x2F;wolf-gladiators-vulcan-l3mZ95PCx30Mxb...</a>