
Wandering Star
7.7K posts

Wandering Star
@SW_Samii
Curator of Chaos Security Weekly Director of Operations (Studio Mom).


Robot lawnmowers can become real-world attack surfaces fast. This conversation explores what happens when connected devices reuse credentials, expose firmware access, and give attackers control over physical systems with moving blades. If compromising one device gives access to every identical device, why are manufacturers still shipping products this way? #Cybersecurity #IoTSecurity #Hacking

The dangerous part about AI isn’t always failure. Sometimes it’s confidence. In this clip, the speaker explains how AI agents can sound technically convincing even when the answer is completely wrong — and why that becomes risky when these systems are integrated into cybersecurity workflows. The problem isn’t just bad answers. It’s believable bad answers. How do you safely use AI systems that don’t reliably admit uncertainty? #AI #CyberSecurity #LLM Now booking interviews at Black Hat 2026. Early access pricing is open. Message us for details!


AI security is no longer defined by testing model vulnerabilities. The clip explains a shift: most organizations now rely on commercial AI systems like OpenAI, Gemini, and Copilot instead of running their own models. That changes the real security lever from model testing to data sharing. What you expose matters more than how the model behaves. Where does that leave traditional AI security practices? #AI #Cybersecurity #DataSecurity





Most teams still treat security policies like documentation. That’s the problem. This clip breaks down why Zero Trust means treating policies like code—versioned, reviewed, and deployed through pipelines. Not buried in a wiki or firewall spreadsheet. If your policies aren’t auditable or automated, are they really protecting anything? Now booking interviews at Black Hat 2026. Early access pricing is open. Message us for details! #cybersecurity #zerotrust #devsecops

Patch faster—or pay the price. CISA is considering cutting vulnerability remediation deadlines from weeks to just three days. Great for security. Brutal for operations. This clip captures the real tension: auditors want speed, but sysadmins are already stretched thin. Faster fixes sound simple—until you have to actually do them. Could your team handle a 3-day patch deadline? #Cybersecurity #PatchManagement #CISA


Most companies think the breach is the crisis. Walter Wilkens explains why the harder part often comes afterward — identifying exactly what sensitive data was exposed and who must be notified. That means digging through compromised systems for PII and PHI while legal teams, insurers, and forensics teams race against the clock. How prepared is your organization for the post-breach phase? #cybersecurity #databreach #incidentresponse


AI in cybersecurity isn’t replacing humans — it’s amplifying them. This discussion argues that experienced practitioners using AI see major productivity gains, but the idea of full replacement is overstated. There’s even a surprising twist: AI-driven cost expectations may be reversing some layoffs. Is the industry underestimating how human cybersecurity still is? #ai #cybersecurity #infosec

Opening ports to the internet is still one of the easiest ways to increase attack surface. In this clip, Rob Allen explains how ThreatLocker is using its existing endpoint agent to provide VPN-style remote access — similar to Tailscale or WireGuard — without exposing ports publicly. Granular access rules mean users only reach exactly what they need. Is agent-based remote access becoming the new VPN standard? #Cybersecurity #VPN #ThreatLocker

