SensorFleet (@sensorfleet) 's Twitter Profile
SensorFleet

@sensorfleet

ID: 933629622587133952

calendar_today23-11-2017 09:33:42

24 Tweet

49 Takipçi

1 Takip Edilen

SensorFleet (@sensorfleet) 's Twitter Profile Photo

Here's how to detect Zerologon attempts using SensorFleet. sensorfleet.com/2020/09/21/Det… #infosec #CyberSecurity #Zerologon

SensorFleet (@sensorfleet) 's Twitter Profile Photo

Check out our new Log Forwarder Instrument - now with first party Azure Sentinel integration medium.com/sensorfleet/st…

SensorFleet (@sensorfleet) 's Twitter Profile Photo

Our latest blog post on how a new SensorFleet Sensor deployment into the partner infrastructure led to almost immediate discovery of an active Confluence vulnerability exploitation attempt. bit.ly/sensorfleet-bl… #Confluence #CyberSecurity #SensorFleet

SensorFleet (@sensorfleet) 's Twitter Profile Photo

New year and new adventures are just around the corner. The whole SensorFleet team wishes you a happy New Year 2022 – may it be the best one yet! #NewYear

New year and new adventures are just around the corner. The whole SensorFleet team wishes you a happy New Year 2022 – may it be the best one yet!

#NewYear
SensorFleet (@sensorfleet) 's Twitter Profile Photo

How did we help our customer to check their networks when Log4Shell vulnerability was reported? What was the impact on our own product? Read our latest blog post and get an insider view! #Log4Shell bit.ly/sensorfleet-bl…

SensorFleet (@sensorfleet) 's Twitter Profile Photo

Having visibility on network services and configuration changes is a critical piece in defensive cyber security strategy. If you’re interested in how to easily scan for both Internet exposed services and within the internal network segments, read this ⬇️ bit.ly/sensorfleet-mo…

SensorFleet (@sensorfleet) 's Twitter Profile Photo

How to get around the manual processes needed to deploy and maintain the network of honeypots, and take care of proper isolation at the same time? By reading our newest use case you’ll find out! bit.ly/sensorfleet-de…

SensorFleet (@sensorfleet) 's Twitter Profile Photo

Majority of cyber security solutions focus on detection and protection. But finding out what has happened starts only after the initial alert. How can you accelerate your incident investigation? We’ll tell you more in our use case 👇🏻​ bit.ly/sensorfleet-fo…

SensorFleet (@sensorfleet) 's Twitter Profile Photo

Complexity of IT and OT environments has increased. What to do when it is getting harder to keep track of all the devices on your networks? Read our use case on network asset visibility and learn more! 🔎 bit.ly/sensorfleet-vi…

SensorFleet (@sensorfleet) 's Twitter Profile Photo

Cyber Capability Fabric is an easy way to deploy cybersecurity across IT, OT and cloud environments. Watch to learn more! 📹​ #cybersecurity

SensorFleet (@sensorfleet) 's Twitter Profile Photo

There are several challenges that may prevent users from getting full value out of the SIEM. How would we solve the most prominent ones? Read more ⬇️ bit.ly/sensorfleet-ad…

SensorFleet (@sensorfleet) 's Twitter Profile Photo

Convergence of IT, OT and Cloud based networks can create unexpected connections between the critical and untrusted networks. Continuous connections monitoring helps in keeping the organization’s exposure at minimum. Read more on our website ​👇 bit.ly/sensorfleet-di…

SensorFleet (@sensorfleet) 's Twitter Profile Photo

Do you know how to monitor the “dark” corners of your networks? Integrated and centralized IDS’s are definitely recommended. But how to get a second line of defence? We’ll tell you more in our use case👇 bit.ly/sensorfleet-de…

SensorFleet (@sensorfleet) 's Twitter Profile Photo

Isolated networks are not always as well isolated as you would think. That’s why testing network isolation is a fundamental security control. Automated audit solution covers multiple and diverse points of failure. Read our newest use case to learn more 👇 sensorfleet.com/use-cases/moni…

SensorFleet (@sensorfleet) 's Twitter Profile Photo

Lately, Zeek has been gaining more and more traction: it is now a component of Microsoft Windows and Defender for Endpoint. We developed support to run Zeek in a cluster mode for high bandwidth requirements. Read more 👇​ sensorfleet.com/2022/10/27/clu…

SensorFleet (@sensorfleet) 's Twitter Profile Photo

In every organization, there is confidential information that needs to be kept safe. Canary tokens are an effective way to do lightweight intrusion detection. In our use case we’ll tell you more how canary tokens can help you trip attackers ⬇️ sensorfleet.com/use-cases/cana…

SensorFleet (@sensorfleet) 's Twitter Profile Photo

Full packet captures are an invaluable source of information for incident investigation, but rarely available. How would we solve this problem? Read more ⬇️ sensorfleet.com/use-cases/anal…

SensorFleet (@sensorfleet) 's Twitter Profile Photo

Antti Tönkyrä on the stage at #Prevent23! 💡 Organizations should consider a model where multiple different #NDR solutions build a "NDR Stack" where you can mix and match different capabilities while also keeping the toolset somewhat standardized. #CyberSecurity

Antti Tönkyrä on the stage at #Prevent23! 

💡 Organizations should consider a model where multiple different #NDR solutions build a "NDR Stack" where you can mix and match different capabilities while also keeping the toolset somewhat standardized.

#CyberSecurity
SensorFleet (@sensorfleet) 's Twitter Profile Photo

Antti Tönkyrä jakaa videolla ajatuksia ja kokemuksia verkon valvonnasta monitoimittajaympäristössä. Antti Tönkyrä sharing thoughts, experiences, and considerations of network based cyber detection and response. In Finnish only. #Prevent23 youtube.com/watch?v=xRqc2R…