Oct. 1, 2023, 2:35 p.m. | /u/KRyTeX13

cybersecurity www.reddit.com

In basically every book or other ressource they talk about pulling a disk image/memory image and then analysing it, but is this the way to do it nowadays? I can only imagine that the company at risk cannot wait for all that to happen, so how does modern IR work?
I heard that often a EDR solution like S1 is deployed but is it possible to find the whole timeline of the incident with tools like this?

book cybersecurity disk edr image incident incident response memory response risk solution the company work

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

DevSecOps Engineer

@ LinQuest | Beavercreek, Ohio, United States

Senior Developer, Vulnerability Collections (Contractor)

@ SecurityScorecard | Remote (Turkey or Latin America)

Cyber Security Intern 03416 NWSOL

@ North Wind Group | RICHLAND, WA

Senior Cybersecurity Process Engineer

@ Peraton | Fort Meade, MD, United States

Sr. Manager, Cybersecurity and Info Security

@ AESC | Smyrna, TN 37167, Smyrna, TN, US | Santa Clara, CA 95054, Santa Clara, CA, US | Florence, SC 29501, Florence, SC, US | Bowling Green, KY 42101, Bowling Green, KY, US