Hacker News new | past | comments | ask | show | jobs | submit login

This is the correct answer, and also the hardest answer because it's going to require you to have to swallow your pride.

Security will already be monitoring your traffic as a basic first step, which they will pipe straight into a SIEM or SOAR system. Doing this stuff will likely get you flagged for an audit.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: