This week's articles
Vulnerability Inbox Zero
Love them or hate them, vulnerability scanners aren't going anywhere. You should tame the avalanche of findings with a noise-suppressing processing pipeline. Think in shovels, not in teaspoons.
Building the Threat Detection Ecosystem at Brex
Brex's approach to building threat detection systems is to abstract the capabilities that allow for high-quality detections and then adapt to the best platforms that are available and appropriate for the team.
Forensic container checkpointing in Kubernetes
#defend, #explain, #kubernetes
Forensic container checkpointing is based on Checkpoint/Restore In Userspace (CRIU) and allows the creation of stateful copies of a running container without the container knowing that it is being checkpointed.
Prioritization of the Detection Engineering Backlog
The detection engineering backlog is a vital starting point for every detection engineering function. By providing an area of input into the detection engineering backlog, cross-functional efficiency can enhance the capability of the detection engineering function.