This week's articles
Vulnerability Inbox Zero
#defend, #strategy
Love them or hate them, vulnerability scanners aren't going anywhere. You should tame the avalanche of findings with a noise-suppressing processing pipeline. Think in shovels, not in teaspoons.
Building the Threat Detection Ecosystem at Brex
#monitor, #strategy
Brex's approach to building threat detection systems is to abstract the capabilities that allow for high-quality detections and then adapt to the best platforms that are available and appropriate for the team.
Forensic container checkpointing in Kubernetes
#defend, #explain, #kubernetes
Forensic container checkpointing is based on Checkpoint/Restore In Userspace (CRIU) and allows the creation of stateful copies of a running container without the container knowing that it is being checkpointed.
Prioritization of the Detection Engineering Backlog
#defend, #monitor
The detection engineering backlog is a vital starting point for every detection engineering function. By providing an area of input into the detection engineering backlog, cross-functional efficiency can enhance the capability of the detection engineering function.
|