Sep 7, 2021

Easter Egg in Modern Browsers

Google Chrome:   chrome://dino

dino bday
chrome://dino

 

Microsoft Edge: edge://surf

edge://surf

Sep 5, 2021

An Easier Way to Multi cloud, Multi account Cloud Compliance (and Demo)

 



Compliance professionals understand the challenges of auditing modern cloud environments that span multiple accounts and multiple cloud providers.

Tools:


Sep 4, 2021

Leveraging OSQuery for Compliance - A Recovering Auditor’s Perspective

 


OSquery, developed by Facebook, is well known among DevSecOps practitioners as a great low-level operating system monitoring tool for endpoints and servers. In part 2 of our 3-part series on automating compliance, SANS Associate instructor AJ Yawn will discuss how compliance professionals can leverage OSQuery to collect technically accurate evidence for security audits in an efficient and streamlined manner.

See the previous blog post about QSquery here.


Sep 2, 2021

InsightVM: Vulnerability Assessment for Modern Environments

This webinar demo the following features for InsightVM:

  • Remote credential scan
  • Dynamic Discovery scan: vSphere, DHCP, cloud, LDAP, sonar
  • Automation/Trigger: new CVE, new critical, new asset
  • Agent-based assessment
  • Policies scan
  • Cloud and container scan
  • Different views of vulnerability
  • Asset criticality
  • Dynamic asset group
  • Dashboard and query
  • Remediation project/plan with ticketing
  • Goal: time-bound, SLA, continuous
  • Automation: notification and workflow
  • Container and registry scan, repository scan, build (CI/CD) scan
  • Cloud configuration
  • REST API access

Links:

Sep 1, 2021

Analyzing Vulnerability Remediation Strategies

Prioritization to Prediction Volume 1: Analyzing Vulnerability Remediation Strategies


Effective remediation depends on quickly determining which vulnerabilities warrant action and which of those have highest priority, but prioritization remains one of the biggest challenges in vulnerability management. 

For the first time, Kenna Security and the Cyentia Institute took a quantitative look at the effectiveness of common remediation strategies and used that data as a baseline to compare against a cutting-edge predictive model.

The results of this research are detailed in the new report, Prioritization To Prediction: Analyzing Vulnerability Remediation Strategies.

  1. Vulnerability Lifecycle
  2. Vulnerability Prioritization
  3. Exploitation Timeline
  4. Exploit Prediction Model

 

Links: