Deception Tech and Automated Incident Response
Tutorials

Deception Tech and Automated Incident Response

In the digital realm, we, as defenders, are too often on the back foot. We hunt for and react to an attacker’s movements, but what if we could direct them for a change and automate what happens next?

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Continuous Security with Snyk
Tutorials

Continuous Security with Snyk

Continuous Improvement should imply 'Continuous Security', but is this really achievable? From a security operations perspective, the question then becomes, how do we automatically track, record, and address risk in near-real or Internet time?

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Part 3 : Respond and protect with a multi-pronged automated approach
Tutorials

Part 3 : Respond and protect with a multi-pronged automated approach

This is part 3 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response including prompting the user to acknowledge the incident via a side-channel.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Part 2 : Enrich alerts, avoid toil, and regain control during incidents
Tutorials

Part 2 : Enrich alerts, avoid toil, and regain control during incidents

This is part 2 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response including prompting the user to acknowledge the incident via a side-channel.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Part 1 : Breaches are inevitable and early detection is crucial
Tutorials

Part 1 : Breaches are inevitable and early detection is crucial

This is part 1 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response including prompting the user to acknowledge the incident via a side-channel.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines