collin
346 posts


@libber But, IMO, under appreciated in most places (I know not you; but a lot of written stuff misses this) is how "prevent" is the biggest leverage. Have _fewer_ dependenices; those you do, have very few with attack surface (e.g., move to a sandbox or don't let them listen on internet)
English

@frgx A flight with no internet + this pleasant nerdsnipe = this long answer: collingreene.com/vuln_mgmt.html
I'm organizationally sheltered but in a big company the above is what I think ideal looks like
English

@mhlakhani True. This organization wall is just begging to have vulns chucked over it
English

I stand by this as my best dotfile advice.
Thomas H. Ptacek@tqbf
Steal or write your dotfiles when you’re 17. Accrete lines over time; remove or edit rarely. The entries in your gradually expanding PATH like rings in a tree trunk. One day you may need your .profile to work on a SunOS 4.1.3 machine again, just wait.
English

@ZackKorman @IceSolst Enjoyable writeup. I feel the same way about the paperwork theater of compliance stuff. I felt slightly better when I accepted that security != compliance and just think of it as a different thing collingreene.com/compliance.html
English

Here’s a thread about how I approached getting ISO27001 certified at Pistachio, written for people who hate these things as much as I do. As @IceSolst says, ACAB includes auditors.
English

An excellent writeup of what makes data "sensitive" and what that means for security and privacy
strategicsec.substack.com/p/the-factors-…
English

@intoverflow Extremely cool. I've long harbored a dream of a coffee table hacking tales book with the benefit of full knowledge + hindsight of 10 interesting breaches or events or something. If this project is that, I want to read it even more!
English

Working on a new history project. A preview:
In 1988, a Cornell grad student releases his secret project — a worm — and quickly realizes he fucked up
So he asks his friend, US Olympic rower Andrew Sudduth, to anonymously send this note
From: foo@bar
To: TCP/IP mailing list

English

The differences between performing privacy and security work in a big company for my fellow computer security people.
collingreene.com/security_and_p…
I'm still newer to privacy work so this is my "most likely to be wrong" writeup, feedback welcome
English

Compliance is different from security: collingreene.com/compliance.html
English

@philvenables Agree with you.
A thing I haven't sorted yet, what is the optimal amount of compliance effort to spend, your post made me finish a post about that: collingreene.com/compliance.html
English

Regulatory Harmonization - Let’s Get Real
Most cybersecurity controls are already relatively aligned. The calls for action on harmonization are really problems induced by obligations from other technology risk domains or broader. In many cases, focusing on reducing compliance toil is the right approach.
philvenables.com/post/regulator…
English

@jeffvanderstoep Good writeup. Agree that vuln prevention > discovery > response.
Curious about
1. How is "old" vs "new" code designated?
2. How is a specific vuln connected to only old or new code? Or am I misunderstanding
3. No counterfactual here right? ex to find/fix vulns in the old code
English

I’m super excited about this blogpost. The approach is so counterintuitive, and yet the results are so much better than anything else that we’ve tried for memory safety. We finally understand why.
security.googleblog.com/2024/09/elimin…
English

@dinodaizovi I like this so much.
This fundamental uncomfortable truth then has weird side effects
1. Buy more snake oil products, because it can't hurt!
2. Use this compliance framework, to at least CYA
3. Build cool stuff, because its fun and pseudo-justifiable.
English


@swagitda_ Walking 1:1s when weather cooperates and under desk treadmill in this wfh world are both very pleasant
English

@IAmMandatory 'write a short story about a hacker in iambic pentameter'
Was a top 5 prompt for me today in messing around
English

@caseyjohnellis @ryanaraine @msuiche Ironically I don't understand twitter privacy so can't see this tweet but feel free to DM me if I can help
English

Thoughts on how to maximize success as an infosec team that needs to roll out changes people may not like -
collingreene.com/communicating_…
English











