Meanwhile in Security (@meanwhileinsec) 's Twitter Profile
Meanwhile in Security

@meanwhileinsec

We have moved! Follow along @LastWeekinAWS

ID: 1379249426271666178

linkhttps://www.lastweekinaws.com/ calendar_today06-04-2021 01:48:00

163 Tweet

201 Takipçi

8 Takip Edilen

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

"Man in the middle, or MITM, attacks are when someone inserts malicious code into the communication of two entities. That MITM service will capture communications, make a copy, then send it along like normal." — Jesse Trucks Have a listen: buff.ly/3geqYSy

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

“A buffer overflow happens when the allocated memory space for some type of input–whether its contents of a file or dialog boxes and the like—is less than the amount of input.” — Jesse Trucks Have a listen: buff.ly/3geqYSy

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

“In simpler terms, there is a bucket available for input. The attacker pours more water into the bucket than the bucket can handle. The result is that code in memory could be overwritten and become executable.” on buffer overflows — Jesse Trucks 🎧 buff.ly/3geqYSy

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

TIPS! “You should have a network scanner that performs routine scans all the time... Don’t scan at the exact same time or in the same order in a day. Splay the times so it’s a bit less predictable.” — Jesse Trucks 🎧 buff.ly/3geqYSy

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

TIPS! “Active scanning like this is valuable in several ways, such as enumerating what devices are answering on your network or networks.“ — Jesse Trucks Have a listen: buff.ly/3geqYSy

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

“Conference calls and remote meetings have the same decade-old problems...Why is this so hard? We live in the golden age of the cloud.” — Jesse Trucks Have a listen: buff.ly/2XO8HF9

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

“Shouldn’t we be easily connecting and sharing like we’re in the same room rather than across the planet? Yes we should.” — Jesse Trucks Have a listen: buff.ly/2XO8HF9

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

“I don’t understand how we can have [all these] options, and still not have a decent way for multiple people to see and hear one another and share a document, or an application, or screen without routine problems.” — Jesse Trucks 🎧 buff.ly/2XO8HF9

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

TIP! . “Lock down your AMIs. If you have Amazon Machine Images—or AMIs—be sure they aren’t available to other people.” — Jesse Trucks Have a listen: buff.ly/2XO8HF9

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

TIP! “Go to your AWS Console, EC2, and then AMIs. Select your AMIs, and then Actions, Modify Image Permissions, and then add your accounts.” — Jesse Trucks Have a listen: buff.ly/2XO8HF9

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

This week Jesse offers some observations on how natural events impact security. Tune in for the details! Have a listen: buff.ly/3t9q2Uy

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

“What does a hurricane have to do with security? Business continuity. Business continuity is the discipline of maintaining business operations, even in the face of disasters of any kind.” — Jesse Trucks Have a listen: buff.ly/3t9q2Uy

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

“If you have all your computing systems in the cloud in multiple regions, then such a disaster won’t fully halt your business operations.” — Jesse Trucks Have a listen: buff.ly/2V5VaI4

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

“You still might have connectivity issues and possibly either temporary or permanent loss of non-cloud systems. Be sure your non-cloud systems have appropriate backups off-site to another geographically disparate location.” — Jesse Trucks Have a listen: buff.ly/3t9q2Uy

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

“Push backups into your cloud infrastructure and consider ways to utilize that data with your cloud systems during a crisis.” — Jesse Trucks Have a listen: buff.ly/3t9q2Uy

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

TIP! “You need to know every single one of the compliance requirements your systems and people touch. Most of these compliance rules and laws cover a fair amount of the same ground.” — Jesse Trucks Have a listen: buff.ly/3t9q2Uy

Meanwhile in Security (@meanwhileinsec) 's Twitter Profile Photo

“It is critical that you have clear documentation for each one on how you are compliant and what processes, or data, or report proves compliance.” — Jesse Trucks Have a listen: buff.ly/3t9q2Uy