Do you have an IT team? Maybe an IT security Dept?

I would ask them and not reddit... They would know their policies and procedures better than we would.

And if you use key-based authentication, rotate your keys

I almost feel as if this should be a r/whoosh somewhere

Ahh. Classic shit post when I wake up on Saturday morning.

Better than the cartoons I used to watch as a kid.

And the wine to boot when the K8S goes down.

Love it!

(Btw how is that Schiopetto? I'm more of a red guy myself)

No. I can only imagine the mental illness it can possibly fuel for not only grieving ones, but for those possibly with other disorders such as PTSD who have served in the military and possibly trying to reconnect with former lost brothers/sisters in combat. Man that would only fuel up some ongoing issues of 'Tom is coming home, I spoke to him, and I'm going to save him today' mentality that may end up getting others hurt unfortunately (and sadly)

Some ideas shouldn't be done unfortunately OP.

Wazuh can do this and is FOSS.

Nessus is possibly considered the industry standard (due to popularity)

OpenVas/Greenbone is another

Delve into AI and ollama.

Deep dive it.

Langchain and even further.

See where it takes you.

Check back in a few months 😂

No prob. If you are going to venture down the DOD/Gov route anytime soon ACAS (their product) is highly similar to Nessus and uses the same plugin IDs etc.

Echoing this.

This is a complete stack here minus a few other things (some GRC tools possibly, I didn't go through it all). You'll be exposed to a ton of tools.

May I suggest starting with vuln scanning and patching first. Then log reviews in your SIEM

From there look into DevSecOps, container security, pipeline security. Gitops.

Certificate management.

Zero Trust (big)

It goes on for ever

Could use Nessus Essentials (free for 16 IPs last I checked)

Wazuh as well

Is this one of those wet paper bags/wet cardboard box jokes

LMFAO

I took a PAY CUT out of college (2nd time college at that) 7 years ago just to bust into IT/Cybersecurity to get out of Law Enforcement (and that's sad because I was paid pennies) and did grunt work just to get any experience I could do put on my resume.

You were given and opportunity for paid experience on a resume, and great experience (most everyone starts help desk and or SOC work, and snuffed at it, in this market?

I'm not about trying to tell people to work their ass off for free or for employers to milk their interns, but that was a great opportunity to bypass the BS and still make halfway decent wage before graduating.

Please learn from this OP, or maybe try to mend it back from your employer before they find the next person willing to grab that experience from them.

I would revert back to my other 4 copies 😂

That's why you have multiple copies of data. I don't trust the cloud source just like I don't trust my USB drives and I don't trust the original source

I always test my backups.

I also have multiple copies of irreplaceable data.

If iDrive decides to bankrupt tomorrow and throw me to the curb I take my data to somewhere else. If my house burns down I go to my other sources for data.

If the world burns and nothing is left ... I watch it burn I suppose 🤷

No no no, you gotta find someone first and date them. Gotta make sure they can turn on the unit properly

Ahhh understandable. I can get behind that for sure.

If it were only me, I wouldnt care too much about the value of backing up my photo library, but being married with kids, my misses and my young ones think otherwise 😂

(yearly subscription costs less than losing all my photos, I once lost my wife's music collection 10 years ago... Never again... )

Look at idrive. $10 for 5tb 1st year. It's one of 4 or 5 locations I store photo archives (one original set at home, one USB backup onsite that I manually connect. One usb I sneaker net to an off-site once a month. I backup off-site once a week and now I use the idrive)

Unsure why the downvote. This is a shit post probably for karma farming.

Pfsense is a firewall/router and 'homelab'esque' solution (some business use cases sure, until I see more businesses hop on it to further test it out... Yes it's freebsd based, I know it's more inherently 'secure')

The other tools are mediocre. There are better tools out there.

Edit: looks like OP deleted themselves. And if I had to guess he was a mod/founder of r/cybersecuritypro that just started up and apparently isn't going anywhere

You need to cut back more of the outer sleeve and expose the inner sleeve, and slide the connector over it . However there's a specific amount of inner sleeve you should expose to fit snuggly into the connector without being 'too much'. It's a bit to explain over text and better to have someone show you in person if you have never done this before (assuming you have not) and honestly not worth the tools or time/effort to learn if you are only terminating coax 1x ever.

If this is a 'patch' coax cable (i.e. it's coming from your wall to the device) go buy a $5 cable at the store and be done .

If this is terminated from the road into the home (looks like it isn't, photos can be deceiving) call the cable company.

Pfft. I have holes in the walls everywhere. I'm in literal project hell right now with all my other projects

(Please send help) 😂

Had a whole abandoned ATT system in mine, hardwired throughout. Called them - they acted clueless.

Day 2 I uninstalled everything - two panels, the main box, several window/door sensors, garage sensor, smoke alarms (theirs, not the homes pre wired) , the whole kit. Off to the dump it goes...

It's not a true DMZ then, that's CF tunnels and a separate dedicated server.

InitCyber
0Edited
1moLink

I'll take a stab. Why a DMZ in 2024. It's not even firewalled off in this lab, just different subnet (doesn't make it a true DMZ, needs complete network segregation from home network.) but even then a DMZ is so 1990.

Regardless, it's not listed right and not firewalled off correctly imo, at least the architecture diagram doesn't reflect it

Edit: it could be my bias now having a second look at this, as I would want two firewalls, one external , then DMZ then one internal, then internal clients. But I see the "network bubble" so to speak, and without knowing the FW rules it's hard to tell if it's properly DMZd. Either way I'm not a fan of DMZs any longer with the advent of VPMs, Cloudflare tunnels, etc.