Keith
@kwm
This is basically a commercial for canary data, identities.
1. Understand what you have that the adversary wants.
2. Sprinkle canaries into docs, DBs, file shares.
3. Lie in wait.
Use point solutions like @ThinkstCanary, or DIY using EDR and/or audit logs. https://x.com/malcomvetter/status/979811665813299200
3/30/2018, 3:05:20 PM
Favs: 38
Retweets: 18
link