rs-

5.2K posts

rs- banner
rs-

rs-

@RustySowers

| intake of security/tech content |

Katılım Kasım 2019
228 Takip Edilen594 Takipçiler
rs-
rs-@RustySowers·
viewed biz security code of conduct as optional 💫 #CyberSecurityAwareness #cybersecuritytips #cyberSecuritynews
rs- tweet media
Ryan@ohryansbelt

Delve, a YC-backed compliance startup that raised $32 million, has been accused of systematically faking SOC 2, ISO 27001, HIPAA, and GDPR compliance reports for hundreds of clients. According to a detailed Substack investigation by DeepDelver, a leaked Google spreadsheet containing links to hundreds of confidential draft audit reports revealed that Delve generates auditor conclusions before any auditor reviews evidence, uses the same template across 99.8% of reports, and relies on Indian certification mills operating through empty US shells instead of the "US-based CPA firms" they advertise. Here's the breakdown: > 493 out of 494 leaked SOC 2 reports allegedly contain identical boilerplate text, including the same grammatical errors and nonsensical sentences, with only a company name, logo, org chart, and signature swapped in > Auditor conclusions and test procedures are reportedly pre-written in draft reports before clients even provide their company description, which would violate AICPA independence rules requiring auditors to independently design tests and form conclusions > All 259 Type II reports claim zero security incidents, zero personnel changes, zero customer terminations, and zero cyber incidents during the observation period, with identical "unable to test" conclusions across every client > Delve's "US-based auditors" are actually Accorp and Gradient, described as Indian certification mills operating through US shell entities. 99%+ of clients reportedly went through one of these two firms over the past 6 months > The platform allegedly publishes fully populated trust pages claiming vulnerability scanning, pentesting, and data recovery simulations before any compliance work has been done > Delve pre-fabricates board meeting minutes, risk assessments, security incident simulations, and employee evidence that clients can adopt with a single click, according to the author > Most "integrations" are just containers for manual screenshots with no actual API connections. The author describes the platform as a "SOC 2 template pack with a thin SaaS wrapper" > When the leak was exposed, CEO Karun Kaushik emailed clients calling the allegations "falsified claims" from an "AI-generated email" and stated no sensitive data was accessed, while the reports themselves contained private signatures and confidential architecture diagrams > Companies relying on these reports could face criminal liability under HIPAA and fines up to 4% of global revenue under GDPR for compliance violations they believed were resolved > When clients threaten to leave, Delve reportedly pairs them with an external vCISO for manual off-platform work, which the author argues proves their own platform can't deliver real compliance > Delve's sales price dropped from $15,000 to $6,000 with ISO 27001 and a penetration test thrown in when a client mentioned considering a competitor

English
0
0
0
59
rs- retweetledi
Mark Lynd 🎙CISSP ISSAP ISSMP
Some of my best conversations happen with local fire and police departments about the tech that supports them in the field. Mission-critical connectivity matters when every second counts. Follow @T_Priority for more on connectivity built for first responders. T-Priority Partner
English
2
11
66
250.9K
rs-
rs-@RustySowers·
for US biz, there’s rarely effective partnership between cyber & physical security ai exploitability progress likely to make it a priority #cybersecurity #cybersecuritytips
rs- tweet media
English
0
0
0
30
rs- retweetledi
Security Weekly Podcast Network
What happens if ransomware runs before the operating system even loads? In this clip, Paul explains a demo where ransomware is triggered from the bootloader, meaning it executes before Windows starts. That removes many of the protections normally enforced by the operating system. The team jokes about how unsettling it is that Paul is experimenting with ransomware — even if it’s a safe demo. If attackers target the boot process itself, how much protection can the OS really provide? #CyberSecurity #Ransomware #BootSecurity
English
0
2
3
155
rs- retweetledi
CISA Cyber
CISA Cyber@CISACyber·
⚠️ We issued four 🆕 and two updated public #ICS Advisories. These advisories provide info about current security issues, vulnerabilities, & exploits surrounding ICS. More at cisa.gov/news-events/ic…
English
0
15
36
7K
rs-
rs-@RustySowers·
right on- much mis-thought today affecting security industry common sense. expect similar notions from those at any biz benefitting from the practice of excessive consolidation plenty examples of us, eu entities moving from excessive consolidation, eg, single cloud, compute os, comms, doc suite, etc. Then, recent cyber events made impactful due to excessive consolidation avoid excessive consolidation (& phys control) especially of critical functions, processes, data to single, external biz. if unavoidable, at min. use care in relying on same biz for critical security products/functions. if still unavoidable, use small % of promised saving$, efficiency gains for truly effective security
English
0
0
0
41
James Robinson | MVP
James Robinson | MVP@SkipToEndpoint·
@RustySowers That's such dated thinking. The "all eggs in one basket" isn't a problem. It's the siloed nature of properly implementing the tools available that causes breaches. Good luck adequately reducing security gaps in a bunch of products that struggle to talk to each other properly.
English
1
0
1
183
rs-
rs-@RustySowers·
is 1st amendment public auditor/iphone auditor an indicator of biz cyber insider threat (unintentional type) ? #CyberSecurityAwareness
English
0
0
0
66
rs-
rs-@RustySowers·
does being an hoa president make a biz user a cyber insider threat #CybersecurityNews
English
0
0
0
43