Yewb@lemmy.worldtoCybersecurity@sh.itjust.works•97% of CrowdStrike systems are back online; Microsoft suggests Windows changesEnglish
72·
3 months agoWhat if they made a kernal that could not be compromised and tools to say exactly what is not a windows component and have people white list background workers.
There is process explorer but make dependencies to the application not always on data thieves.
So an interesting thing about the Israeli military, they empower all levels of the command chain to make decisions to complete the mission.
It leads to this interesting situations where top leader can claim complete ignorance and the mission was completed.
Look up the big brain little brain stuff.