{"id":254,"date":"2017-03-11T15:44:00","date_gmt":"2017-03-11T15:44:00","guid":{"rendered":"https:\/\/securityeverafter.com\/2017\/03\/11\/unauthorized-change-detected\/"},"modified":"2017-03-11T15:44:00","modified_gmt":"2017-03-11T15:44:00","slug":"unauthorized-change-detected","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/unauthorized-change-detected\/","title":{"rendered":"Unauthorized Change Detected!"},"content":{"rendered":"
I recently posted the below on the SANS Internet Storm Center. How do you detect what has changed in your environment? Is it possible to think beyond the alerts you get from your tools and consider what changes that you absolutely need to know about when they occur? When systems in your environment move from \u201cnormal” to “abnormal”, would you […]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[12,18],"tags":[],"jetpack_publicize_connections":[],"yoast_head":"\n
I recently posted the <\/span>below<\/a> on the <\/span>SANS Internet Storm Center<\/a>.<\/span><\/p>\n