Skip to content

The digital town square for the concert band community.

Connect with local ensembles, trade repertoire insights, and keep the pulse of the wind band world.

  • Presentation mode: ON.

    World cybersecurity sysadmin identity zerotrust blueteam
    6
    0 Votes
    6 Posts
    0 Views
    ๐Ÿ Martin Guay ๐Ÿ‘จโ€๐Ÿ’ป๐ŸŒˆ๐ŸŽฎ๐Ÿ“ฑM
    @argv_minus_one Thatโ€™s the million-dollar question. No single signal is 100% foolproof, which is why Zero Trust relies on contextual telemetry. Itโ€™s not just 'is the device clean?' but 'is the behavior consistent?' We look at hardware-backed keystores (TPM), mTLS, and behavioral analytics. If the 'signal' is perfect but the user is accessing 500 records from a new IP at 3 AM, the trust score drops to zero. Verification is a continuous conversation, not a one-time gate.
  • 0 Votes
    1 Posts
    0 Views
    David J. Bianco (He/Him)D
    Everyone wants to know how good #AI is at vulnerability discovery, exploitation, and running automated attacks. Good, fine. That's useful.What we really need, though, is for some of these frontier models to start worrying about the much more challenging, impactful problem of defense. Let's see some good benchmarks here, and have model providers publish their results. #BlueTeam
  • 0 Votes
    1 Posts
    0 Views
    Bluewall :verified:B
    Spent hours debugging an Intune Win32 app supersedence failure.Checked mstsc file locks. Reviewed uninstall scripts. Analyzed power events. Pulled device diagnostics.Claude reads the logs:"Your uninstall command says uninstall.ps"...It's always the typo ๐Ÿซ #Intune #MicrosoftEndpointManager #BlueTeam #ITAdmin