collin

342 posts

collin

collin

@libber

Присоединился Eylül 2007
516 Подписки2K Подписчики
collin
collin@libber·
@tqbf + pass them on to your children
English
0
0
0
42
collin
collin@libber·
@ZackKorman @IceSolst Enjoyable writeup. I feel the same way about the paperwork theater of compliance stuff. I felt slightly better when I accepted that security != compliance and just think of it as a different thing collingreene.com/compliance.html
English
0
0
2
58
Zack Korman
Zack Korman@ZackKorman·
Here’s a thread about how I approached getting ISO27001 certified at Pistachio, written for people who hate these things as much as I do. As @IceSolst says, ACAB includes auditors.
English
13
15
101
14.4K
collin
collin@libber·
@intoverflow Extremely cool. I've long harbored a dream of a coffee table hacking tales book with the benefit of full knowledge + hindsight of 10 interesting breaches or events or something. If this project is that, I want to read it even more!
English
0
0
3
48
Tim Carstens Ⓥ✨ is hacking 🤖
Working on a new history project. A preview: In 1988, a Cornell grad student releases his secret project — a worm — and quickly realizes he fucked up So he asks his friend, US Olympic rower Andrew Sudduth, to anonymously send this note From: foo@bar To: TCP/IP mailing list
Tim Carstens Ⓥ✨ is hacking 🤖 tweet media
English
5
1
8
785
collin
collin@libber·
The differences between performing privacy and security work in a big company for my fellow computer security people. collingreene.com/security_and_p… I'm still newer to privacy work so this is my "most likely to be wrong" writeup, feedback welcome
English
0
0
5
274
Phil Venables
Phil Venables@philvenables·
Regulatory Harmonization - Let’s Get Real Most cybersecurity controls are already relatively aligned. The calls for action on harmonization are really problems induced by obligations from other technology risk domains or broader. In many cases, focusing on reducing compliance toil is the right approach. philvenables.com/post/regulator…
English
1
1
11
1.6K
collin
collin@libber·
@jeffvanderstoep Good writeup. Agree that vuln prevention > discovery > response. Curious about 1. How is "old" vs "new" code designated? 2. How is a specific vuln connected to only old or new code? Or am I misunderstanding 3. No counterfactual here right? ex to find/fix vulns in the old code
English
0
0
0
99
Jeff Vander Stoep
Jeff Vander Stoep@jeffvanderstoep·
I’m super excited about this blogpost. The approach is so counterintuitive, and yet the results are so much better than anything else that we’ve tried for memory safety. We finally understand why. security.googleblog.com/2024/09/elimin…
English
6
74
276
54.6K
collin
collin@libber·
@_noid_ I’ve perfected coffee for myself. Foamed fairlife milk + coconut milk + maple syrup x 3 shots expresso
English
1
0
1
134
Hot Fiendish Dr. Noid Summer
Alright folks, I'm having a shitty day. Tell me something good you've got going on in your world right now. Let me hear about your wins and hopefully that turns my day around.
English
17
2
21
3.3K
collin
collin@libber·
@dinodaizovi I like this so much. This fundamental uncomfortable truth then has weird side effects 1. Buy more snake oil products, because it can't hurt! 2. Use this compliance framework, to at least CYA 3. Build cool stuff, because its fun and pseudo-justifiable.
English
1
0
1
107
Dino A. Dai Zovi
Dino A. Dai Zovi@dinodaizovi·
The number one reason why good security is hard is that the feedback loop on decisions is long and the signal is low fidelity. It's not clear how many incidents were prevented or mitigated from which foundational decisions years prior. This wrecks the incentives to be proactive.
English
5
14
37
5.2K
Misha Davidov 🏳️‍⚧️
Upside: In the morning I get to take a ride in this brand new Rolls Royce Phantom Extended II! Downside: It's to a surgery center. Upside: It's to get a new face! Downside: It's going to take ~7 hours. Upside: Finally being myself. bbiab.
Misha Davidov 🏳️‍⚧️ tweet media
San Francisco, CA 🇺🇸 English
6
0
24
3.9K
collin
collin@libber·
@swagitda_ Walking 1:1s when weather cooperates and under desk treadmill in this wfh world are both very pleasant
English
1
0
2
181
Kelly Shortridge
Kelly Shortridge@swagitda_·
given all the documented benefits of walking on creativity and brainstorming, has anyone tried like… walking offsites? not power walking but the ideal three mile per hour stroll
English
7
2
27
6.2K
Dom Narducci
Dom Narducci@dnathe4th·
Today in nominative determinism // @wolfejosh
Team USA@TeamUSA

.@USA_Taekwondo Paraympian Evan Medell is a man on mission. “The only reason I’m back is to win gold [at Paris 2024]. That’s it. That’s all I’m trying to do.”

English
1
0
2
811
collin
collin@libber·
@IAmMandatory 'write a short story about a hacker in iambic pentameter' Was a top 5 prompt for me today in messing around
English
1
0
2
0
mandatory.bsky.social
mandatory.bsky.social@IAmMandatory·
ChatGPT is coming for both STEM and the arts, this shit is impressive as hell.
mandatory.bsky.social tweet mediamandatory.bsky.social tweet media
English
2
13
48
0
collin
collin@libber·
Shift left in 60 seconds - libber.org/shift_left_in_… I've had success with shift left as a central strategy of infosec teams for the last n years and attempted a tl;dr of it without marketing fluff
English
0
1
11
0
collin
collin@libber·
@philvenables I think marketing has made it seem vague, imo its concretely about more security for less effort, earlier (thus less realized risk) and feedback loops to have all stages improve: libber.org/shift_left_in_…
English
0
0
3
0
Phil Venables
Phil Venables@philvenables·
Often a better way to think about the vague concept of "shift left" is for the goal to be to move more security from run time to build time.
English
18
21
103
0
collin
collin@libber·
@theharmonyguy I’ve listened to hours of the same song in because it’s what Apple Music plays when I plug my phone into the car. Amusing little routine of modern life
English
0
0
1
0
Joey Tyson
Joey Tyson@theharmonyguy·
Me in the car: *plugs in iPhone, listens to music while driving* Me 20 minutes later, getting back in the car: *plugs in iPhone to pick up playlist where I left off* Apple Music: “Ah you clearly now want to hear random songs in your library you haven’t played since college!”
English
3
0
4
0
collin
collin@libber·
@ryanaraine Yeah, it might look a bit random but our Red Team X does security research on a bunch of things we might consider using. This turns into CVEs in software, firmware, hardware, consumer devices etc.
English
1
0
11
0
Ryan Naraine
Ryan Naraine@ryanaraine·
Why's the Facebook offensive security research team breaking into Schneider Electric PLC boxes? Or Airspan 4G access points? Such odd target choices. engineering.fb.com/2022/07/20/sec…
English
3
2
8
0