this post was submitted on 03 May 2024
30 points (89.5% liked)
cybersecurity
5897 readers
6 users here now
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Oh one different situation: because I've been on the side of supplying logs to cyber forensic analysts as part of cyber insurance post breach, the level of scrutiny will matter. If they find you're doing something they don't want on work equipment near or around a cyber incident you'll be part of the post breach recommendations. As in, what to remediate.