Conor Richard

3.1K posts

Conor Richard banner
Conor Richard

Conor Richard

@xenosCR

Cyber, OSCE, OSWE, OSCP Certified, Knowledge Seeker, and my opinions are my own.

Katılım Ocak 2015
641 Takip Edilen1.2K Takipçiler
gabsmashh
gabsmashh@gabsmashh·
i have questions.
gabsmashh tweet media
English
287
441
3.6K
761.3K
Conor Richard retweetledi
Dr. Anton Chuvakin
Dr. Anton Chuvakin@anton_chuvakin·
I love detection engineering, I think it is awesome and hugely needed, and its the future and all that. But I have no idea how to talk about it to a team of 1 (ONE) running a SIEM ...
English
30
13
236
82K
Conor Richard retweetledi
Claudio Criscione
Claudio Criscione@paradoxengine·
Repeat after me: vulnerability management is not incident response. We see an RCE a week, why do we randomly select a few to be OMGTHISBAD and scramble? All those other RCEs being discriminated are sad... and still popping you.
English
5
4
24
5.6K
Conor Richard
Conor Richard@xenosCR·
Technically unemployed for a few days. New adventures await starting Monday!
English
0
0
3
624
Conor Richard
Conor Richard@xenosCR·
@bohops Barely squeaked into the new parent in my 30s category but, this is true.
English
1
0
1
128
bohops
bohops@bohops·
If you want to get really good at threat modeling, I'd suggest start having children in your 30s 🙃
English
3
0
16
2.8K
Conor Richard retweetledi
Jeffrey Snover
Jeffrey Snover@jsnover·
Priorities are not what you say, they are what you fund. Culture is not what you say, it's what you reward. Action is a lie detector.
English
8
50
281
34.7K
Jessica McCabe
Jessica McCabe@HowtoADHD·
Does anyone here know how to relax? Like…intentionally? …and not immediately get bored and start a new project? #ADHD
English
427
266
4.4K
233.7K
Conor Richard retweetledi
Dune Quotes
Dune Quotes@DuneQuoteBot·
Once men turned their thinking over to machines in the hope that this would set them free. But that only permitted other men with machines to enslave them.
English
4
185
545
34.4K
Conor Richard retweetledi
Mohamed El Azaar
Mohamed El Azaar@med0x2e·
@HackingLZ Some immature companies (ex; no SIEM or whatever) tend to go for RTs before PTs for leverage. mainly to get management to take a seat in the same room, listen, and take security more seriously ($$$).
English
0
1
2
426
Conor Richard retweetledi
bohops
bohops@bohops·
I guess the general points are: - We need more people to contribute to the profession - We need to encourage people to share (coaching and validation are acceptable) - The community that shares defensive content is smaller IMO. It would be great to see others in this space
English
0
2
13
1.3K
Conor Richard retweetledi
bohops
bohops@bohops·
The leap that it takes to publicly share infosec knowledge/content is generally underappreciated. Often, folks who want to share with the community do not out of anxiety/fear of acceptance/etc. And then, there is the asymmetry of those who share offensive content vs defensive.
Nasreddine Bencherchali@nas_bench

I love how when someone shares an offensive tool he gets praised. But when a blue teamer shares a detection he's told that it's bypassable/weak. 🤫

English
1
2
18
3.8K
Conor Richard retweetledi
bohops
bohops@bohops·
Be a perpetual student. Expertise is a snapshot in time that eventually fades away.
English
0
13
32
5.6K
Conor Richard
Conor Richard@xenosCR·
@ustayready I did and same on running my own. I had 3-4 BBS' I would pop onto daily to play.
English
0
0
2
0
Mike Felch (Stay Ready)
Mike Felch (Stay Ready)@ustayready·
Anyone ever play Legend of the Red Dragon (LORD) decades ago on bbses? I ran my own node so I could give my self extra turns without the wait
English
14
0
24
0
Adrian
Adrian@NRG_03·
@xenosCR cannot find you. is there a typo?
English
1
0
0
0