Zeitpunkt Nutzer Delta Tröts TNR Titel Version maxTL Fr 26.07.2024 00:01:07 274.776 +10 5.697.668 20,7 mastodon.cloud 4.1.18 500 Do 25.07.2024 00:00:10 274.766 +9 5.695.805 20,7 mastodon.cloud 4.1.18 500 Mi 24.07.2024 00:00:00 274.757 +12 5.694.383 20,7 mastodon.cloud 4.1.18 500 Di 23.07.2024 00:01:00 274.745 +11 5.692.740 20,7 mastodon.cloud 4.1.18 500 Mo 22.07.2024 00:01:11 274.734 +5 5.691.059 20,7 mastodon.cloud 4.1.18 500 So 21.07.2024 00:00:59 274.729 +12 5.689.566 20,7 mastodon.cloud 4.1.18 500 Sa 20.07.2024 00:00:27 274.717 -1 5.688.145 20,7 mastodon.cloud 4.1.18 500 Fr 19.07.2024 14:01:13 274.718 +1 5.686.903 20,7 mastodon.cloud 4.1.18 500 Do 18.07.2024 00:01:09 274.717 +13 5.685.656 20,7 mastodon.cloud 4.1.18 500 Mi 17.07.2024 00:01:11 274.704 0 5.683.927 20,7 mastodon.cloud 4.1.18 500
Nep (Travis) Smith (@nep) · 11/2022 · Tröts: 4.505 · Folger: 302
Fr 26.07.2024 23:01
Our client at Berkeley is this weeking having to have Endpoint Detection and Response software installed on their server to protect against malware.
Basically, the same type of software that let Crowdstrike become the single point of failure that was 100% outside their control.
I don't understand the tradeoff of "checkbox compliance" vs basic security truisms, like, don't give root access to too many people and especially not third-parties.
https://security.berkeley.edu/services/endpoint-detection-and-response
[Öffentlich] Antw.: 0 Wtrl.: 0 Fav.: 0