Meanwhile in Security
@meanwhileinsec
We have moved! Follow along @LastWeekinAWS
ID: 1379249426271666178
https://www.lastweekinaws.com/ 06-04-2021 01:48:00
163 Tweet
201 Takipçi
8 Takip Edilen
"Man in the middle, or MITM, attacks are when someone inserts malicious code into the communication of two entities. That MITM service will capture communications, make a copy, then send it along like normal." — Jesse Trucks Have a listen: buff.ly/3geqYSy
“A buffer overflow happens when the allocated memory space for some type of input–whether its contents of a file or dialog boxes and the like—is less than the amount of input.” — Jesse Trucks Have a listen: buff.ly/3geqYSy
“In simpler terms, there is a bucket available for input. The attacker pours more water into the bucket than the bucket can handle. The result is that code in memory could be overwritten and become executable.” on buffer overflows — Jesse Trucks 🎧 buff.ly/3geqYSy
TIPS! “You should have a network scanner that performs routine scans all the time... Don’t scan at the exact same time or in the same order in a day. Splay the times so it’s a bit less predictable.” — Jesse Trucks 🎧 buff.ly/3geqYSy
TIPS! “Active scanning like this is valuable in several ways, such as enumerating what devices are answering on your network or networks.“ — Jesse Trucks Have a listen: buff.ly/3geqYSy
Why do conference calls suck? Jesse Trucks wonders this same, tune in for Jesse's take! Have a listen: buff.ly/2XO8HF9
“Conference calls and remote meetings have the same decade-old problems...Why is this so hard? We live in the golden age of the cloud.” — Jesse Trucks Have a listen: buff.ly/2XO8HF9
“Shouldn’t we be easily connecting and sharing like we’re in the same room rather than across the planet? Yes we should.” — Jesse Trucks Have a listen: buff.ly/2XO8HF9
“I don’t understand how we can have [all these] options, and still not have a decent way for multiple people to see and hear one another and share a document, or an application, or screen without routine problems.” — Jesse Trucks 🎧 buff.ly/2XO8HF9
“Why do they all suck? When I have to use some of these platforms, I dread the coming meeting.” — Jesse Trucks Have a listen: buff.ly/2XO8HF9
TIP! . “Lock down your AMIs. If you have Amazon Machine Images—or AMIs—be sure they aren’t available to other people.” — Jesse Trucks Have a listen: buff.ly/2XO8HF9
TIP! “Go to your AWS Console, EC2, and then AMIs. Select your AMIs, and then Actions, Modify Image Permissions, and then add your accounts.” — Jesse Trucks Have a listen: buff.ly/2XO8HF9
“What does a hurricane have to do with security? Business continuity. Business continuity is the discipline of maintaining business operations, even in the face of disasters of any kind.” — Jesse Trucks Have a listen: buff.ly/3t9q2Uy
“If you have all your computing systems in the cloud in multiple regions, then such a disaster won’t fully halt your business operations.” — Jesse Trucks Have a listen: buff.ly/2V5VaI4
“You still might have connectivity issues and possibly either temporary or permanent loss of non-cloud systems. Be sure your non-cloud systems have appropriate backups off-site to another geographically disparate location.” — Jesse Trucks Have a listen: buff.ly/3t9q2Uy
“Push backups into your cloud infrastructure and consider ways to utilize that data with your cloud systems during a crisis.” — Jesse Trucks Have a listen: buff.ly/3t9q2Uy
TIP! “You need to know every single one of the compliance requirements your systems and people touch. Most of these compliance rules and laws cover a fair amount of the same ground.” — Jesse Trucks Have a listen: buff.ly/3t9q2Uy
“It is critical that you have clear documentation for each one on how you are compliant and what processes, or data, or report proves compliance.” — Jesse Trucks Have a listen: buff.ly/3t9q2Uy
Meanwhile in Security is now Last Week in AWS Security, follow along on Last Week in AWS!