Jump to content
OpenSecurity.global

Kieran Grieve Combes

Members
  • Content Count

    5
  • Joined

  • Last visited

  • Invited by

    Quentyn Taylor

Community Reputation

2 Neutral

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. EDR should also allow you do too things such as remote process/memory fingerprints and capture. I've seen ones that allow you to isolate a host from the network and only allow it communicate to the edr controller, you can also do more advanced forensic captures. if it's just doing av it's not edr because the response part is missing.
  2. @Glenn Pegden thumbs up for stw, it's a wonderful place mostly.
  3. I'm an ex pentester and red teamer now heading up threat, vulnerability and app sec for a large retailer also Interim head of security operations. London based. Before security i managed ad and exchange environments for finance companies.
×
×
  • Create New...

Important Information

We use cookies as we're cookie monsters. Privacy Policy