
Snode Technologies
@Snode_Tech
Followers
368
Following
172
Media
184
Statuses
334
Snode uses Intelligence Amplification to enable businesses to proactively respond to cyber security threats.
Joined October 2016
AppsAfrica Awards 2020 - Cybersecurity Award Finalists are..... @Snode_Tech (South Africa), Intore Security Lab @IntoreSec(Rwanda), App Detonator @sirackh(Ethiopia) Sendmarc @sendmarcdotcom(South Africa) #AppsAfrica #Awards #Africa #Tech
0
2
2
Focus your attention on just a few attack patterns, what’s being used in the market? For example implanting and collisions are popular in finance, mining, manufacturing markets.
0
0
1
How to benefit from threat intelligence by using it in a tactical manner? Get proof of compromise, find out the entry point and your vulnerabilities. The power of this approach lies in how we can implement these tactics ourselves to understand threats from attackers.
1
0
0
Threat modelling security design Use threat modelling intelligence to understand risk exposures and develop mitigating strategies
1
0
0
Adversary behaviour based testing Using attacker tactics & procedures to test response capabilities
1
0
0
Threat intelligence based testing Using threat intelligence parameters as inputs to design in order to describe the testing process
1
0
0
Cyber Threat Intelligence Examining threat intelligence attributes, testing misuse cases and value beyond data feeds
1
0
0
Scope, approach and methodology Understanding the testing process, requirements and assessment output value proposition
1
0
0
Five ways to be aware of in Adversary Behaviour Attack Simulation
1
0
0
Keep an eye out for more details below this thread to find out more about how telemetry and cybersecurity can help you protect yourself from future breaches
1
0
0
We’re back for Day 2 of our virtual conference in collaboration with @Panda_Security and @Cyanre . Our CEO Nithen Naidoo will be sharing visibility & insight into cybersecurity processes, demonstrated through a live simulation
1
0
0
Critical mistakes businesses make post-incident: 1. Not communicating 2. Communicating too soon 3. Communicating too much
0
0
1
Our first port of call in a breach event: get a defense posture as up as soon as possible to limit and reduce the resultant risks to isolate the incident as quickly as possible.
0
0
1
What is our key learning from previous global breaches that we have assisted with? When responding to an incident, there are three distinct streams of approach post-breach: defense, forensics and recovery.
1
0
1
Today Snode is hosting day 1 of a virtual conference in collaboration with @Panda_Security and @Cyanre on how to manage a cybersecurity incident, from containment to policies and preventative measures. Keep an eye on this thread for insights from our CEO Nithen Naidoo
1
1
4
Looking forward to hearing @Snode_Tech Pitch Live at #ATSConnects with @DisruptAfrica
https://t.co/30QIkOpn2S
0
1
1
Inventors Garage winners are: -Wazinsure -Sanineat -TRxEAT -Sustainable Energy Technologies -SlideLuvre -Eco Invader Solutions -Snode Guardian #sais2020 #virtual365
0
1
3
We're one of SA's leading and most innovative Cybersecurity companies and we've been selected as finalist in the 2020 Innovation Summit Inventors Garage competition, powered by the Department of Trade, Industry. Watch our video https://t.co/kNJ9q9iGpJ
#innovation #SAIS2020
0
1
0