A 3000+ word article that went into how to prevent the occurrence or impact of such a hack.
This topic had a lot of comments on LinkedIN. Sometimes we need to just start with the basics.
Written some time ago, but still good, is a plan for CXO hiring security leaders to use as a guide for putting their own 30, 60, 90 day goals.
When you see multiple instances of something, you then realize there is a larger root cause to the problem. Broken auth is such a rampant and ignored problem, I decided to frame it as a disease.
DEF CON is overwhelming for the beginner. Every time I meet a new DEF CON attendee, they always say they WISH there was a guide to the con. Well, here it is. I mean, take a look at the TOC! There’s also an updated part 2 at the end.
Wish I had this guide on #defcon by @coffeewithayman back when I first when years ago. Looking forward to heading out there this week:
— kensington moore (@Kensington_M)
3:09 PM • Aug 8, 2022
A philosophy I’ve been using this past year is that Infosec is not black and white, it’s 50 shades of gray.
A small fictional, but realistic, portrayal of how three different CISO’s can approach security in a starkly different way.
Thanks for reading this far! Hope you found these articles useful. Feel free to share with friends and your network.
-Ayman
Reply