TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

What It Takes to Defend a Cybersecurity Company from Today's Adversaries

176 点作者 gnabgib23 天前

12 条评论

dubbel23 天前
Heh, given the title I initially thought SentinelOne was addressing the Chris Krebs situation, and the adversary would be the current administration. But it&#x27;s about different nation state actors.<p>(context: <a href="https:&#x2F;&#x2F;www.cnbc.com&#x2F;2025&#x2F;04&#x2F;16&#x2F;former-cisa-chief-krebs-leaves-sentinelone-after-trump-exec-order.html" rel="nofollow">https:&#x2F;&#x2F;www.cnbc.com&#x2F;2025&#x2F;04&#x2F;16&#x2F;former-cisa-chief-krebs-leav...</a> )
评论 #43842584 未加载
评论 #43842815 未加载
评论 #43842741 未加载
评论 #43842547 未加载
sublimefire23 天前
It was an interesting read whilst having a cup of coffee. But rather shallow. A couple of mentions of some tools: goreshell, shadowpad, scatterbrain. It might be targeting C-suite folks more than analysts or other security folks. It is more about how you should be slightly afraid to do it on your own and better hire sentinelone to help you.
评论 #43842506 未加载
评论 #43842754 未加载
CyberMacGyver23 天前
It’s RSA time so expect lot of cybersecurity posts
评论 #43841461 未加载
评论 #43842129 未加载
PeterStuer23 天前
I tuned in late to this show. Are they down to tHe DPRK because they already successfully rooted out the MOSSAD, CIA and NSA insiders in previous episodes?
评论 #43842467 未加载
ElWalkingBeard23 天前
About 7GB of RAM, in my experience
looperhacks23 天前
Is there any way to recognize adversary IT workers? Not many companies have the capabilities of cybersecurity experts
评论 #43841971 未加载
评论 #43842105 未加载
评论 #43841949 未加载
评论 #43843151 未加载
评论 #43844887 未加载
评论 #43842714 未加载
评论 #43842496 未加载
评论 #43843732 未加载
评论 #43842033 未加载
评论 #43841972 未加载
评论 #43848231 未加载
ganoushoreilly23 天前
The excess use of — within this really screams &quot;I Used ChatGPT to write&#x2F;rewrite this&quot;.
mediumsmart23 天前
I am glad they don&#x27;t have to pay for training - rule 1,2 and 3 - keep your overheads low.
mikewarot23 天前
You just <i>can&#x27;t</i> secure something like Windows, Linux, MacOS, because it&#x27;s faulty by design. Any business that claims to be able to do so is selling snake oil.<p>Capability based operating systems <i>can</i> be made secure. Data diodes are a proven strategy to allow remote monitoring without the possibility of ingress of control. Between those two tools, you have a <i>chance</i> of useable and secure computing in the modern age, even against advanced threats.<p>Yeah... I feel like Cassandra, but here we are. You&#x27;ve been warned, yet again.
评论 #43844461 未加载
评论 #43844117 未加载
评论 #43849469 未加载
评论 #43842870 未加载
评论 #43842476 未加载
评论 #43842589 未加载
gitroom23 天前
straight up, i always underestimate how much black market stuff runs alongside the official security game. you think closing those leaks really comes down to better tech or is it always just smarter people?
motohagiography23 天前
the key message to me was a reminder that setting up front companies to purchase security services and software for reverse engineering and competitive analysis is table stakes.<p>I knew it was common, even standard in some playbooks, but I always underestimate the parallel black market services economy.
hulitu23 天前
&gt; Recent adversaries have included: DPRK IT workers posing as job applicants ransomware operators probing for ways to access&#x2F;abuse our platform Chinese state-sponsored actors targeting organizations aligned with our business and customer base<p>Thank god there were no Russians or Iranians. &#x2F;s
评论 #43842132 未加载
评论 #43841969 未加载