A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios:
✑ Unauthorized insertions into application development environments
✑ Authorized insiders making unauthorized changes to environment configurations
Which of the following actions will enable the data feeds needed to detect these types of attacks on development environments? (Choose two.)
nelombg
Highly Voted 1 year, 5 months agodeeden
Most Recent 7 months, 3 weeks agodeeden
7 months, 3 weeks agoBright07
8 months, 2 weeks agoIT_Master_Tech
8 months, 3 weeks ago23169fd
12 months agoEAlonso
1 year agocyspec
1 year agoToPH
1 year, 1 month agora774ra7
1 year, 5 months agotalosDevbot
1 year, 5 months agoBiteSize
1 year, 11 months agokycugu
2 years, 6 months agoatebyasandwich
2 years, 6 months agodangerelchulo
2 years, 10 months agoAgrona
2 years, 11 months agoAlexJacobson
2 years, 11 months agoAlexJacobson
2 years, 11 months agoBiteSize
1 year, 11 months agoRevZig67
3 years, 1 month ago