-
Content Count
1 -
Joined
-
Last visited
-
Invited by
Ben Chung
-
Open Club · 23 members · Last active
In order to bridge the skill & resource gap, we need more people getting INTO cyber security - and those that are already in could use help on how to grow faster and in more consistent way. This club focus is towards not just compiling resources (even though books, courses & trainings are worthy inclusions), but mostly the whole package - to be used either by people trying to get into cyber, as well as cyber leaders/senior professionals/organizations trying to build reasonable career & development path for their staff. How to work with universities, how to define entry level learning objectives, how to mend the gaps caused by different educational background, how to identify the quickest way how to get people into self-driving mode etc. Programs, curriculums, shared experience in "this works" and "this does not" is welcome
-
Open Club · 17 members · Last active
Share IOC and clusters for Login abuse and participating bots infrastructure. n face of increasing threats from various actors there is business need to detect and mitigate abusive traffic emitted to accomplish data scraping, account peeking, login abuse, credential stuffing, and competitive data aggregation from automated entities (not just limited to bots/iots/mobile farms etc) . I wanted to see what techniques community is finding useful for detection and what works/not works. I have a private conversation thread that I can invite members so we can share data around if there is use for it.