Muaadh Almarfadi’s Post

View profile for Muaadh Almarfadi

Senior Cyber Security Consultant at R3

Insider threat

Guen R.

Student at Kent State University

6y

Lol!! threat comes in all form. In cyber security, an employee could be used as a channel to circumvent security measures ( I know! like the guys here on the look out. It is dreadful to have an insider bring in an infected device and plug it into the system and pull down into an inferno of ransomware attacks). Unless you have a solution that's not a firewall. I can’t imagine a firewall deterring this behavior. May be something that encrypt disk from within the environment and at the same time perform a kind of threats emulation from within the environment at the endpoints. And even better if such features can be integrated into the gateways so that every paquet or files coming through the door goes through the emulation process that dismantle packets, files and forward only clean copies to the user and keeps macros for further emulation until final verdict to release the macros as well to user who continues to work with the first clean copy of the file. If such solution exist I think this guy here would not scare the hell out of the devoted guardians :). Does such solution exist if not lets make one?

Like
Reply
Like
Reply
Michael Shawn Garrett

Searching for career in intelligence field.

6y

They are gonna' kill that dog.

Like
Reply
Cláudio Duarte

Analista DevOps | AWS | GCP | AZURE

6y

bem feito, bicho dos infernos é esse tal de gato....l

Like
Reply

so funny..

Like
Reply
Erik Ransom Sr.

Mechanic Professional Bus Operator @ Barons Bus Lines/Cleveland Southeastern Trails

6y

Way too funny 😭

Like
Reply
Peter A. Tolson

Assistant Manager, Pacesetter,Allstar & #1 in Sales at Nordstrom

6y

That is so wrong LOL...!!!

Like
Reply
Kevin Beenham

Retired Battalion Chief at City of Surrey Fire Service

6y

Time for decaf catnip....

Like
Reply
Abdul R. Sait

Director @ Microsoft | Cloud Security Specialist

6y

😂 love it

Like
Reply
See more comments

To view or add a comment, sign in

Explore topics