3:21 Can the malware not be contained in a VM with a hypervisor on a single isolated, dedicated physical computer (hypervisors especially the bare metal ones are such a bad idea that it beggars belief they’re even allowed), in order to be analysed by a forensic specialist?
3:31 Well, what can you expect if the paradigm of cybersecurity is centered on (loss of) money instead of protecting people’s data? Coupled with poor cyber awareness it spells disaster.
3:55 Nonsense. Once the social security numbers are known to hackers how does changing passwords help to prevent hackers from using the data they stole? The horse has bolted already and organisations implement a more sophisticated system of bringing it hay. Hey, the horse is miles and miles away. That’s the ‘hey ho’ phase of cyber defence.
5:08 Oh, yes. Cyber insurance. They’re not hand in hand with the big software companies and cloud services companies that can’t be bothered to do a proper job in the first place, are they? Racketeering, anyone? No, of course not. Silly me. 🤔
Background sound made me emotional and tense.
Background sound made me dream of simpler times..
Short and simple.. impressive
Thanks so much!
Thank you for this, short and simple😍😍🥰
Dang, whoever wrote the source article for this video is like wicked smart! :D
Brilliant, thanks
The SIEM tool showed in the video looks like EventTracker?
the music in the background killed it for me but i appreciate your explanations
Wow
Put me asleep
3:21 Can the malware not be contained in a VM with a hypervisor on a single isolated, dedicated physical computer (hypervisors especially the bare metal ones are such a bad idea that it beggars belief they’re even allowed), in order to be analysed by a forensic specialist?
3:31 Well, what can you expect if the paradigm of cybersecurity is centered on (loss of) money instead of protecting people’s data? Coupled with poor cyber awareness it spells disaster.
3:55 Nonsense. Once the social security numbers are known to hackers how does changing passwords help to prevent hackers from using the data they stole? The horse has bolted already and organisations implement a more sophisticated system of bringing it hay. Hey, the horse is miles and miles away. That’s the ‘hey ho’ phase of cyber defence.
5:08 Oh, yes. Cyber insurance. They’re not hand in hand with the big software companies and cloud services companies that can’t be bothered to do a proper job in the first place, are they? Racketeering, anyone? No, of course not. Silly me. 🤔