Abhijeet Hatekar
Redmond, Washington, United States
247 followers
251 connections
View mutual connections with Abhijeet
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Abhijeet
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Organizations
-
Microsoft
-
View Abhijeet’s full profile
-
See who you know in common
-
Get introduced
-
Contact Abhijeet directly
Other similar profiles
Explore more posts
-
CYBER DEFENSE MAROC
1K followers
Not all alerts are created equal. Master alert triage by focusing on context: asset criticality, attack vector, and threat intelligence. Prioritize what threatens your crown jewels first, then tackle the noise. Efficient triage = faster response, less burnout. Your SOC’s secret weapon? Smarter, not harder. 🔍 #Cybersecurity #AlertTriage
-
Daniel Young
Circadian Risk Inc. • 9K followers
Here’s a pattern I’m seeing more often: More sites. More assessments. More reporting expectations. Same headcount. Security teams are being asked to scale output without scaling structure. So what happens? Assessments become episodic. Reporting takes too long. Prioritization becomes subjective. And leaders spend more time translating risk than reducing it. This isn’t a capability issue. It’s an architecture issue. At some point, physical security has to operate with the same operational discipline as finance and IT. Otherwise it stays in permanent catch-up mode. For security people overseeing medium to large portfolios (20+ sites): What’s currently your biggest bottleneck volume, visibility, or validation? And why do you think this is?
5
1 Comment -
Chickasaw Telecom, Inc.
941 followers
Identity and Access Management (IAM) is a key guardrail for secure access. This guide explains core IAM components, how they protect resources, and why they are foundational to Zero Trust security strategies. Read the breakdown: http://oal.lu/nq0Lr #IAM #ZeroTrust #Security
-
Jonathan Risto P. Eng
Most exposure programs don’t… • 3K followers
I’ve been thinking about exposure management less as a tooling problem and more as a systems problem. When discovery grows faster than mobilization capacity, exposure doesn’t just increase — it compounds. That accumulation is exposure debt.
16
2 Comments -
Stuart Dixon
WesDx • 219 followers
Building cloud forensic infrastructure isn't just "spin up some VMs." Here's what actually matters. 🏗️ Most labs approach cloud forensics the same way they approached on-prem: "We need X workstations with Y storage." That's not wrong, but it misses the point. Cloud forensics architecture isn't about replicating your office in AWS. It's about leveraging capabilities you couldn't have on-prem. Here's what changes: 1. Compute becomes elastic, not fixed On-prem: Buy 10 workstations, use them or not, you own them Cloud: Provision what you need, when you need it, scale up for urgent cases, scale down when idle. Architecture question: How variable is your workload? If you're idle 40% of the time, why pay for 24/7 capacity? 2. Storage becomes tiered, not one-size-fits-all On-prem: Buy fast storage for everything (expensive) or slow storage for everything (frustrating) Cloud: Active cases on high-performance storage, archival cases on cheap cold storage, and tier it transparently and automatically. Architecture question: How much of your evidence needs instant access or what are you working on right now vs. "available when needed"? 3. Access becomes location-independent On-prem: Analysts come to the evidence Cloud: Evidence is accessible from anywhere with proper authentication Architecture question: Is your team co-located or distributed? One office or multiple regions? 4. Isolation becomes default, not afterthought On-prem: Malware analysis requires separate airgapped machines Cloud: Every case can be its own isolated environment, spun up fresh, torn down when complete Architecture question: How often do you handle potentially hostile evidence? 5. Disaster recovery becomes automatic On-prem: Hope your backups work and your office doesn't flood Cloud: Geographic redundancy is built-in, failover is automatic Architecture question: What happens to your active cases if your office is inaccessible for a week? The point isn't "cloud is always better." It's that Cloud enables architecture patterns that on-prem can't. If your cloud forensics setup looks exactly like your office (fixed capacity, static allocation, everyone uses their own workstation), you're probably leaving capability on the table. Design for what cloud does well: - Variable capacity - Geographic flexibility - Ephemeral environments - Automated resilience What's one capability you wish your current infrastructure had? #DigitalForensics #DFIR #CloudArchitecture #ForensicInfrastructure #CloudForensics
-
Corero Network Security
8K followers
🚨 Just released: Corero’s 2025 Threat Intelligence Report 🚨 DDoS atacks are no longer just big floods.They're frequency, evasion, and protocol pivoting. Key insights: • 11 attacks/day avg. in 2024 • Mid-size attacks declining • Multi-vector attacks on the rise Read the release: https://bit.ly/44kLkn0
15
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content