Try our new research platform with insights from 80,000+ expert users

Badges

20 Points
4 Years

User Activity

Over 2 years ago
I need more context: do you scan inbound uploads to your servers/website? and is it a public upload portal?
Almost 3 years ago
SES is what I use as a prescriptive security measure to discourage brute force attacks on Windows and Mac devices. P2P control:https://techdocs.broadcom.com/...
Almost 3 years ago
@Clement Johnson No sir, HIPS and HFW are not cumbersome to manage, and PnP solutions are most common way you get Compromised, PNP then gives you have an excuse to blame someone else secret sauces for felling you and your business, exposing your business to extortion, and…
Almost 3 years ago
SEP/SES and its firewall have a feature to stop this: 1. Use location-aware FW rules and policy with allowed access lists to only jump servers. 2.  Enable SEP/SES P2P enforcement - Peer-to-Peer Authentication Settings (broadcom.com).
About 4 years ago
I my opinion Application and browser isolation is the future, and crucial to properly layering protections again email threats born in phishing attacks.
About 4 years ago
Contributed a review of Prisma Access by Palo Alto Networks: Stable with good posture checking and relatively easy to set up