Saso Virag

19.4K posts

Saso Virag banner
Saso Virag

Saso Virag

@VS_

Been there, done that, didn't get a t-shirt because I'm too old to be bought by vendor-ware. Security; risk; information use, misuse, and abuse.

Katılım Şubat 2009
718 Takip Edilen1.2K Takipçiler
Saso Virag retweetledi
The Provost / سيدة الفتنة
Random question for Violent Asshole Monitoring Twitter: Anyone know off the top of your head any recently [last 5-7 years] thwarted incel-inspired attacks? For some reason I’m drawing a blank.
English
3
4
16
2.5K
Kate Brew
Kate Brew@securitybrew·
The upside of Suzy is she’d figure out how to monetize it. Rob would keep it rational. Snoop would keep it fun. Cathie would be good at vision.
English
1
0
3
589
Saso Virag retweetledi
Dr. Anton Chuvakin
Dr. Anton Chuvakin@anton_chuvakin·
Yes, I still see people who equate "defense in depth" with "using two firewalls of two different brands in series." YES, THEY STILL EXIST, these people. #random
English
12
17
73
28.6K
Saso Virag retweetledi
Robert Graham
Robert Graham@robertgraham·
This is probably why I don't get invited to do more panels. Right after the audience applauds the speaker who said "be suspicious of suspicious things", I go on a rant how they are all wrong. twitter.com/ErrataRob/stat…
Robert Graham@robertgraham

This last item is what really gets me. I'm in a room full of cyber experts and somebody says something like be "wary of suspicious" things and everyone nods their heads like this is a real thing. IT'S NOT A REAL THING. THIS ISN'T MEANINGFUL ENGLISH. CAN'T YOU PEOPLE SEE IT??

English
1
1
11
3.6K
Saso Virag retweetledi
Stefano Zanero
Stefano Zanero@raistolo·
@anton_chuvakin Also because “buried in concrete and sunk” lacks availability, so, by definition, not secure 😂 I always hated that phrase!
English
1
2
5
1.3K
Saso Virag retweetledi
Dr. Anton Chuvakin
Dr. Anton Chuvakin@anton_chuvakin·
Are there technologies that are "inevitably secure", defined as secure no matter what the user does with it? Please don't use "buried in concrete, then sunk to the ocean floor" examples, I mean the tech that is actually used... #random
English
49
12
43
31K
Saso Virag
Saso Virag@VS_·
Indeed. Especially since “cyber” now includes EW, IO, kinetic attacks of critical infrastructure, and everything else that used to be included under the “information warfare” umbrella. “I can’t define ‘cyber’, but I know it when I see it.” twitter.com/TheEconomist/s…
Saso Virag tweet media
The Economist@TheEconomist

“It is a fallacy to say that cyber has not been a factor in the war in Ukraine,” Sir Jeremy Fleming, the director of @GCHQ, wrote earlier this year. “It is a very modern digital and cyber war, as much as it is a brutal and destructive physical one” econ.st/3WlwiWJ

English
0
1
1
184
Saso Virag
Saso Virag@VS_·
Somebody leaked the minutes of my last meeting with the $SECURITY_VENDOR.
English
0
0
1
149
Saso Virag retweetledi
Kyle Bailey
Kyle Bailey@KyleBailey22·
Doing incident response without all of your log data in a SIEM
English
2
5
29
0
Saso Virag
Saso Virag@VS_·
Previous tweet, but also
Saso Virag tweet media
English
0
0
2
0
Saso Virag retweetledi
🌻 @twetzling@eupolicy.social
🌻 @[email protected]@twetzling·
Having discussed this further w/ oversight practitioners & reviewing several legal frameworks @dietricharlotte and I argue that there is a pressing need in Europe to curb the risk of disproportionate use of such data by intel services.
English
1
1
0
0
Saso Virag retweetledi
🌻 @twetzling@eupolicy.social
🌻 @[email protected]@twetzling·
Non-compulsory gov access to personal data can be tied to automated open-source intelligence (OSINT) and the acquisition of enormous personal data through purchases from data brokers ... but the options are plenty
🌻 @twetzling@eupolicy.social tweet media
English
1
1
2
0
Saso Virag retweetledi
🌻 @twetzling@eupolicy.social
🌻 @[email protected]@twetzling·
Yet, non-compulsory modes of government access to personal data are missing from the discussion. They are a non-topic in the EU-US DPF and - as argued by @ashgorski - are also beyond the scope of the U.S. Executive Order 14086 . Source: justsecurity.org/83927/the-bide…
🌻 @twetzling@eupolicy.social tweet media
English
1
1
1
0
Saso Virag retweetledi
🌻 @twetzling@eupolicy.social
🌻 @[email protected]@twetzling·
Having skimmed through the text, I want to share a 🧵 on what I found missing in the document. It ties to the assumption highlighted below:
🌻 @twetzling@eupolicy.social tweet media
English
1
1
1
0
Saso Virag retweetledi
Dee Madigan
Dee Madigan@deemadigan·
This sentence is screaming for a sub-editor.
Dee Madigan tweet media
English
50
15
262
0
Saso Virag retweetledi
Clare O'Neil MP
Clare O'Neil MP@ClareONeilMP·
This project will be led by 3 experts: Andy Penn, Rachael Falk and Mel Hupfeld. In addition, some of the biggest cyber guns from around the world have agreed to help. @ciaranmartinoxf will lead a global cyber expert panel, who will ensure our work really is world-leading. #NPC
English
2
5
11
0
Saso Virag retweetledi
Clare O'Neil MP
Clare O'Neil MP@ClareONeilMP·
The Cyber Security Strategy will: -Bring the whole nation into the fight to protect our citizens & economy -Strengthen critical infrastructure & gov networks -Build sovereign capabilities -Strengthen our international engagement so we can be a global cyber-leader #NPC
English
2
6
11
0