
Richard Bejtlich ๐พ ๐บ๐ฆ
@taosecurity
Followers
56K
Following
26K
Media
2K
Statuses
23K
Inactive on Twitter since 1 November 2022. Find me here: https://t.co/9xgPCjr0Rq
Washington, DC
Joined December 2008
Inspired by @netresec, I decided to claim @taosecurity on a Mastodon server:
2
1
7
As an ex-@usairforce intel officer who was active duty in 1999, I enjoyed the new book "Shooting Down the Stealth Fighter," by the Serb personnel manning the S-125/SA-3. It's mostly about IADS, but it offers a ton of unclass details for #airpower fans. #ad
0
4
7
I'm pleased to see @Suricata_IDS getting some marketing love at my company @corelight_inc's web page. We offer a true #networksecuritymonitoring platform at up to 100 Gbps, with all 4 NSM data types (alerts, transaction logs, extracted files, and pcap).
go.corelight.com
Corelight integrates Suricata IDS with Zeekโs rich network telemetry to evolve beyond the standalone intrusion detection system.
0
1
4
Speaking of @Microsoft embedding @Zeekurity into @Windows, here's a post I wrote in 2008 explaining why and how #networksecuritymonitoring on the endpoint would be helpful. It's so cool to see a concrete step in this direction, on a massively-deployed OS:
2
0
12
This is not a late "April Fool." This is real. I've been waiting months to say it. Now it's public. @Microsoft is embedding @Zeekurity into @Windows. This brings #networksecuritymonitoring to a potential billion+ endpoints. Hear Microsoft's take, Thu-Fri:
๐งตWe are excited to share that @Zeekurity is now a component of @Microsoft @Windows ! An incredible development that truly establishes Zeek as the de facto standard for #networkevidence:. 1/4.
3
26
64
Much as you might love your team and job, it's better to resign than compromise your integrity. There is no shortage of open CSO or other security executive roles. If you find truly egregious conditions, you might become a legal whistleblower like @dotMudge. That takes real guts.
1
2
7
Why does no one care about this story? Is it because those who usually promote privacy also use this data? I read the vendor's rebuttal. It's a joke that they deny the usefulness of IP addresses for identifying individuals or patterns of life. End #Augury.
New: the US military has spent millions of dollars on a powerful internet monitoring tool that includes browsing data, email data, cookies, more. Data is worldwide, covers 90%+ of the internet, harvested from ISPs then sold to military by private company.
0
0
9
I look forward to trying this. Wireshark is the gold standard for making it totally simple to try one form of network traffic observation. Download, install, run, select interface, see packets. Packet inspection isnโt everything, but itโs a key part of #networksecuritymonitoring.
#Wireshark 4.0.0 has been released. Enjoy.
1
1
5
I highly recommend this @BSidesAugusta talk by @DavidJBianco on his #PyramidofPain. He explains how we implemented a strategy (10+ years ago) to detect and respond to intrusions before adversary mission completion, via threat intelligence-driven campaigns.
4
21
64
In 2019 I wrote a blog for @corelight_inc, "Network security monitoring is dead, and encryption killed it." My goal was to debunk that long-standing myth. Apparently at least 1 security company didn't get the point. ๐คฆโโ๏ธ#NSMlives despite encryption. Pls see:
0
1
14
This is one of the reasons for my longstanding policy of not accepting connection requests from anyone but those with whom Iโve closely worked for at least several months. I believe in trying to improve the LinkedIn ecosystem.
Someone created a ton of fake LinkedIn profiles for people claiming to be CISOs at Fortune 500 firms. LinkedIn took several down after being notified, but the profiles garnered quite a few CISO connections. Highlights need for more reputation tools on LI.
1
1
9