Proactive and detection
Hunts
Developing countermeasures
Deceptive technologies
Honeynet
Honeypot
Decoy files
Simulators
Dynamic network configurations
Security data analytics
Processing pipelines
Data
Stream
Indexing and search
Log collection and curation
Database activity monitoring
Preventive
Antivirus
Immutable systems
Hardening
Sandbox detonation
Application control
License technologies
Allow list vs. block list
Time of check vs. time of use
Atomic execution
Security automation
Cron/scheduled tasks
Bash
PowerShell
Python
Physical security
Review of lighting
Review of visitor logs
Camera reviews
Open spaces vs. confined spaces