-
## What is the proposed Cheat Sheet about?
The proposed cheat sheet, titled "Incident Response for Web Applications," aims to provide a practical guide for handling security incidents related to …
-
The RSIT is described as a reference taxonomy for "security incidents" - is this term currently formally defined in the RSIT, and if not, should it be?
For example, I note that the current version …
-
### Description
Symantec EDR exposes advanced attacks with precision machine learning and global threat intelligence minimizing false positives and helps ensure high levels of productivity for securi…
-
When a tenant is fully deleted it's just all removed from the DB. For a in-use tenant that's a pretty "serious" operation so we can think about what auditing could be done to track if that happens, he…
-
#### ⚠️ GitGuardian has uncovered 4 secrets following the scan of your pull request.
Please consider investigating the findings and remediating the incidents. Failure to do so may lea…
-
**Describe the feature:**
Ability to create reports based on specific query on a schedule basis that can be saved to a shared drive or network share ( NTFS , CIFS etc).
**Describe a specific use cas…
-
Currently only two OQS sub projects have publicly documented SECURITY.md handling procedures defined. The set of people receiving "privately" reported security vulnerabilities in those is pretty large…
-
---
name: 📋 Technical Workshop Preparation SOP
about: Create a new ticket for preparing for a technical workshop.
title: aelfinity Developer Workshop with RNS Institute of Technology
labels: 'docume…
-
It appears that the M365 Defender Integration is creating a fingerprint based on some lastUpdate times:
https://github.com/elastic/integrations/blob/d38087c71ce6dd66bc63ef08935f6e4e02777c38/package…
-
### Feature Description
Add an option in the modal of the `/hellper_incident` command so that an incident is opened silently.
A silent incident is characterized by having a private channel and …