The *?*, as to how often, weekly or whatever, may be a bit skewed toward the norm...which
is passe; now, there is no norm in IT Security like there was 20 some years ago....everyday
the perps and actors change tactic and so the landscape is redrawn as they re-equip and
redefine the parameters for themselves; NOW exploits differ from moment to moment and can
transform in pre-planned stages of growth, exploiting a small footprint once established
on and ever expanding forey. This happens in mere microseconds' VIZ.: like an inside job,
it flows with bits and bytes across the whole enterprise from endpoint to endpoint and you
know nothing, then outward to reclaim yet another workgroup or domain. We have all been
had, so-called training should be daily, moment by moment, hands on...reporting and
compliance are good but hunting them down and prosecuting them is much, much better...I'd say!
-codewarorange
The *?*, as to how often, weekly or whatever, may be a bit skewed toward the norm...which
is passe; now, there is no norm in IT Security like there was 20 some years ago....everyday
the perps and actors change tactic and so the landscape is redrawn as they re-equip and
redefine the parameters for themselves; NOW exploits differ from moment to moment and can
transform in pre-planned stages of growth, exploiting a small footprint once established
on and ever expanding forey. This happens in mere microseconds' VIZ.: like an inside job,
it flows with bits and bytes across the whole enterprise from endpoint to endpoint and you
know nothing, then outward to reclaim yet another workgroup or domain. We have all been
had, so-called training should be daily, moment by moment, hands on...reporting and
compliance are good but hunting them down and prosecuting them is much, much better...I'd say!
-codewarorange