𝒟𝒶𝓃𝒾𝑒𝓁

90K posts

𝒟𝒶𝓃𝒾𝑒𝓁 banner
𝒟𝒶𝓃𝒾𝑒𝓁

𝒟𝒶𝓃𝒾𝑒𝓁

@eyeTSystems

@[email protected] : InfoSec manager for big transport company. Former AppSec for enterprises, and cyber/sys eng consultant for small business in SA.

South Australia, Australia Katılım Eylül 2011
537 Takip Edilen337 Takipçiler
𝒟𝒶𝓃𝒾𝑒𝓁
𝒟𝒶𝓃𝒾𝑒𝓁@eyeTSystems·
@manjusrii By way of comparison, this paragraph tells much of the story, but only already know the answer. "ChatGPT is bullshit" walks you through the philosophical and linguistic nuance to get to the conclusion. I can't believe I'm spending the time on X to say how much I like a paper.
𝒟𝒶𝓃𝒾𝑒𝓁 tweet media𝒟𝒶𝓃𝒾𝑒𝓁 tweet media
English
0
0
1
32
𝒟𝒶𝓃𝒾𝑒𝓁
𝒟𝒶𝓃𝒾𝑒𝓁@eyeTSystems·
@manjusrii Yes, we can, and should. I've read that paper properly twice today, and while it smacks of a 20 year old extracting the urine for a sweary title, it also has some really good points. Impressed by how well it explains the conclusions. Excluding the hard bullshit parts, 10/10
English
1
0
0
21
𝒟𝒶𝓃𝒾𝑒𝓁
𝒟𝒶𝓃𝒾𝑒𝓁@eyeTSystems·
@GodlyTrident @GossiTheDog @helvetehansen Nope. If that were all security needed, we would have been unemployed a long time ago. It’s missing the two biggest issues we’re going to continue to face in the medium term, being AI and supply chain. Neither are solved problems, neither will be solved with SE or netflow.
English
0
0
1
184
Trident
Trident@GodlyTrident·
@GossiTheDog @helvetehansen Modern security is basically about traffic monitoring and preventing people from falling into social engineering traps. I mean, people are even storing their enterprise passwords in browser and third party apps and other personal info.
English
1
0
2
467
Matt Zorich
Matt Zorich@reprise_99·
We are often engaged with organizations that have lost complete control of their Microsoft Entra ID tenant, I wrote a comprehensive blog post on lessons learned from real world engagements to try to help reduce the risk of the same happening to you microsoft.com/en-us/security…
English
11
161
520
70.7K
Road 0f Excess
Road 0f Excess@Palace0fWisdom·
@eyeTSystems @blackroomsec You can still have password lockout and with a complex password if you have a written policy that X lockouts equals a phone call or other direct contact, I’d say it’s mitigated.
English
1
0
0
15
BlackRoomSec
BlackRoomSec@blackroomsec·
I have, perhaps, a dumb question to ask. Two, if you'll indulge me. Why is the password in every breach something simple? I don't think it's all laziness. I could be wrong but it just seems to me that everyone just assumes it's laziness and that there aren't other factors involved so they never look for any other explanation. Isn't that also being lazy? I think if they did and they found it wasn't laziness and in let's say out of every 100 breaches they shared a common reason we could try to fix that problem? My second question is how are all these orgs that have breaches with simple to guess passwords being part of the foothold which got them jacked, passing audits? I don't want to sound like I'm holding a grudge but my experience with MSPs that package in cybersecurity compliance training and resources with monthly services don't really know what they're doing all the time. At what point do they get held accountable for telling a client they passed with flying colors and then six months later we find out the client got hacked and the password is, oh let's live little, rockyou. 😳 I'm not trying to start trouble here but I'm really curious is anybody else out there concerned that this keeps happening and I don't mean from a cyber security perspective I mean from a common sense one.
English
44
11
100
18.5K
𝒟𝒶𝓃𝒾𝑒𝓁
𝒟𝒶𝓃𝒾𝑒𝓁@eyeTSystems·
@blackroomsec @BDess82 Couldn’t agree more. Controls are Physical, Technical and Administrative. If a control is not technical or physical, it’s voluntary, and compliance needs to recognise that.
English
0
0
0
18
BlackRoomSec
BlackRoomSec@blackroomsec·
@BDess82 Then that's not an audit but the honor system and defeats the purpose of one.
English
2
0
2
82
𝒟𝒶𝓃𝒾𝑒𝓁
𝒟𝒶𝓃𝒾𝑒𝓁@eyeTSystems·
@blackroomsec @Palace0fWisdom This one is difficult - it’s not usually stating that this methodology is implicitly removing offline brute force as a risk. If you’re consciously accepting this class of risk as being of little importance for your org, fine… but it’s often lost in the conversation.
English
1
0
1
21
BlackRoomSec
BlackRoomSec@blackroomsec·
You're correct. NIST r5, Microsoft security baseline to name two compliance standards, no longer recommends password rotation because of the reasons you state, only in the event of breach now. MSPs haven't caught on hence why I mentioned they don't know. It's a problem for me because they're advertising Cybersec services and expertise.
English
3
0
7
451
𝒟𝒶𝓃𝒾𝑒𝓁
𝒟𝒶𝓃𝒾𝑒𝓁@eyeTSystems·
@troyhunt @stripe Reimbursement still gives Finance control of purchases. It’s not ideal, and exceptions “can” be made, but it has to be for a valuable service, and pre-approved for SaaS and similar.
English
0
0
0
17
𝒟𝒶𝓃𝒾𝑒𝓁
𝒟𝒶𝓃𝒾𝑒𝓁@eyeTSystems·
@troyhunt @stripe Tickets - PO Lunch - Directors have a card if they’re invited, otherwise reimbursement Taxi/meals reimbursement, hotels booked by admin on our behalf In our case it’s all about control. Only approvers can ask for a PO to be raised. Card purchases by director only.
English
1
0
0
38
Troy Hunt
Troy Hunt@troyhunt·
We often receive comments to the effect of “we want to purchase a @haveibeenpwned subscription but our company doesn’t allow us to use a credit card”. What is the financial reason behind this? This is a very small portion compared to those that *do* pay by card, but why is this?
Gold Coast, Queensland 🇦🇺 English
42
5
135
100.5K
𝒟𝒶𝓃𝒾𝑒𝓁
𝒟𝒶𝓃𝒾𝑒𝓁@eyeTSystems·
@andreamatranga Got to say, as someone who has been adjacent to a project in this space, nobody, and I mean nobody is actually giving a shit - there’s no money in traditional business cases to develop the app… Follow up question, how bad is it? GTFS seems to be OK from my basic analysis??
English
0
0
0
39
Andrea Matranga 🇺🇦🌻
Andrea Matranga 🇺🇦🌻@andreamatranga·
It's pretty clear that nobody involved with Google Maps development ever walks anywhere or takes public transit. I think a maps app that took these use cases seriously could really prosper.
English
181
117
3.5K
332.6K
Troy Hunt
Troy Hunt@troyhunt·
Twice in the last day, I’ve had someone call me and say “I missed a call from this number”. Both Aussies, both sound legit and both suggesting outbound spam calls have spoofed my number. I still have full control of the number (not SIM hijacked), ideas? @Telstra?
Troy Hunt tweet media
English
44
6
178
113.3K
𝒟𝒶𝓃𝒾𝑒𝓁
𝒟𝒶𝓃𝒾𝑒𝓁@eyeTSystems·
@MalwareJake You’re not wrong. But in businesses that are still maturing, it does provide 95% of the log data that is required, for endpoints with the agent installed. It’s not the only log location, nor the only control, but it’s OK. As long as the org understands their blind spots.
English
0
0
0
440
Jake Williams
Jake Williams@MalwareJake·
Repeat after me: EDR (or XDR, whatever someone defines that as) is *not* a SIEM replacement. If someone is claiming this, they either misunderstand the situation or they're trying to sell you EDR...
English
28
43
288
72.9K