Главная
Study mode:
on
1
Intro
2
Security Theater
3
Password Changes
4
Security Intelligence
5
Firewall Logs
6
Tools
7
Metrics
8
Code Quality
9
Collecting data
10
Hector
11
Pentest
12
Security Onion
13
Threat Intelligence
14
Bias
15
Results
16
Disadvantages
17
Conclusion
Description:
Explore a comprehensive analysis of security intelligence and its distinction from fear, uncertainty, and doubt (FUD) in this 48-minute conference talk from Derbycon 2012. Delve into topics such as security theater, password changes, firewall logs, and threat intelligence. Learn about various tools and metrics used in security intelligence, including code quality assessment and data collection methods. Examine the role of penetration testing and security onion in gathering valuable insights. Discuss the impact of bias on results and consider the potential disadvantages of security intelligence approaches. Gain practical knowledge to enhance your understanding of effective security practices and separate fact from fiction in the cybersecurity landscape.

Separating Security Intelligence from Security FUD

Add to list
0:00 / 0:00