Try our new research platform with insights from 80,000+ expert users

Badges

User Activity

16 days ago
Regular Testing and Validation: The system should support regular testing and validation to ensure its ongoing effectiveness. This includes various testing methods such as penetration, load, and failover testing to identify and address any vulnerabilities. Compliance and…
16 days ago
What are the key performance indicators (KPIs) we should monitor to evaluate the effectiveness of our CEM system?
16 days ago
How frequently should we conduct penetration testing to ensure our CEM system remains secure against evolving threats?
About 1 month ago
When evaluating Threat Modeling, prioritize encryption (at rest and in transit), regular patching, and third-party integrations. Ensure these practices follow security standards as per the application industry.
About 1 month ago
Yes. It's useful if you want to have a strong shift left approachable security controls to detect threats early in the development cycle.
About 1 month ago
How are you guys handling false positives? Our application teams are complaining about false positives. They are rejecting the field in classifier tuning, but it has certain limitations
About 1 month ago
How are you guys handling false positives? Our application teams are complaining about false positives. They are rejecting the field in classifier tuning, but it has certain limitations
About 1 month ago
How are you guys handling false positives? Our application teams are complaining about false positives. They are rejecting the field in classifier tuning, but it has certain limitations
About 1 month ago
How are you guys handling false positives? Our application teams are complaining about false positives. They are rejecting the field in classifier tuning, but it has certain limitations
About 1 month ago
How are you guys handling false positives? Our application teams are complaining about false positives. They are rejecting the field in classifier tuning, but it has certain limitations
About 1 month ago
How are you guys handling false positives? Our application teams are complaining about false positives. They are rejecting the field in classifier tuning, but it has certain limitations
About 1 month ago
Quick Update: BigID's classifier tuning can be limited in effectively reducing false positives, especially if the data is complex or the algorithms have inherent limitations.
4 months ago
Contributed a review of Rapid7 InsightCloudSec: Enhances security posture with cost efficiency and powerful APIs
7 months ago
Microsoft Entra Permissions Management is a cloud-based service that offers identity and access management (IAM) capabilities. It can be employed as a cloud infrastructure entitlements management (CIEM) solution to gain visibility into user and role activities. The service…
7 months ago
It was supposed to be CloudKnox when we started implementing this JIT solution for AWS IAM Permissions management, Now, Microsoft bought that too and named as EPM, and with the recent release with SNow integration which can enable give JIT access to AWS accounts via SSO…
7 months ago
Data Security and Privacy Management (DSPM), the practice of storing passwords and secrets in data systems poses significant risks.1. Exposure of sensitive information which can lead to data breaches. 2. Regulatory violations to store sensitive information. 3. Increased…

Projects

About 1 month ago
certping
CertPing is a monitoring and alerting solution designed to track the status and expiration of SSL/TLS certificates. It helps organizations avoid downtime or security risks caused by expired certificates by providing automated alerts and proactive management. CertPing ensures…

Reviews

Questions

Answers

About 1 month ago
Threat Modeling
7 months ago
Data Security Posture Management (DSPM)

Comments

16 days ago
Critical Event Management (CEM)
16 days ago
Critical Event Management (CEM)
About 1 month ago
Data Governance
About 1 month ago
Data Governance

About me

Principal DevOps Security Engineer with detailed technical knowledge and hands-on experience in DevOps, AWS, Python, CloudSecurity, Data Security, Cloud Logging, Automation, Build, and Release engineering which enables operations and development teams to deliver code to customers more reliably & securely quickly

Interesting Projects and Accomplishments

About 1 month ago