Anthony Kraudelt

@Anthony_Kraudelt@infosec.exchange
45 Followers
15 Following
106 Posts

With experience working in information security, including almost two decades of investigations in the fields of cybersecurity and risk assessment, I’ve excelled at triaging, investigating and securing high-tech systems emerging cyber threats.

My training and experience have allowed me to stay on the cutting edge of technology; combating new threats and implementing successful techniques to mitigate and resolve complex cyber matters.

I believe in the importance of team building, the ability to foster a positive working environment and bringing out the best in the people around me. I’m a lifelong learner, with a goal of continuously improving myself and passing knowledge to colleagues and the communities I serve.

Websitehttps://www.kraudelt.com
Credlyhttps://www.credly.com/users/anthonykraudelt/badges
LinkedInhttps://www.linkedin.com/in/anthonykraudelt/

On the first day of Die Hard, Nakatomi gave to me:
A "Yippee-ki-yay!"

On the second day of Die Hard, Nakatomi gave to me:
Two agent Johnson's,
And a "Yippee-ki-yay!"
("I'm agent Johnson. This is special agent Johnson. No relation.")

On the third day of Die Hard, Nakatomi gave to me:
Three henchmen,
Two agent Johnson's,
And a "Yippee-ki-yay!"
("Who said we were terrorists?")

On the fourth day of Die Hard, Nakatomi gave to me:
Four calling cops,
Three henchmen,
Two agent Johnson's,
And a "Yippee-ki-yay!"
("Welcome to the party, pal!")

On the fifth day of Die Hard, Nakatomi gave to me:
Five machine guns!
Four calling cops,
Three henchmen,
Two agent Johnson's,
And a "Yippee-ki-yay!"
("Now I have a machine gun.Ho-ho-ho.")

On the sixth day of Die Hard, Nakatomi gave to me:
Six C4s a-laying,
Five machine guns!
Four calling cops,
Three henchmen,
Two agent Johnson's,
And a "Yippee-ki-yay!"
("Take this under advisement")

On the seventh day of Die Hard, Nakatomi gave to me:
Seven SWAT a-storming,
Six C4s a-laying,
Five machine guns!
Four calling cops,
Three henchmen,
Two agent Johnson's,
And a "Yippee-ki-yay!"
("The quarterback is toast!")

On the eighth day of Die Hard, Nakatomi gave to me:
Eight vents a-crawling,
Seven SWAT a-storming,
Six C4s a-laying,
Five machine guns!
Four calling cops,
Three henchmen,
Two agent Johnson's,
And a "Yippee-ki-yay!"
("Come out to the coast, we'll get together, have a few laughs")

On the ninth day of Die Hard, Nakatomi gave to me:
Nine angry bad guys,
Eight vents a-crawling,
Seven SWAT a-storming,
Six C4s a-laying,
Five machine guns!
Four calling cops,
Three henchmen,
Two agent Johnson's,
And a "Yippee-ki-yay!"
("Only John can drive somebody that crazy.")

On the tenth day of Die Hard, Nakatomi gave to me:
Ten Hans a-threatening,
Nine angry bad guys,
Eight vents a-crawling,
Seven SWAT a-storming,
Six C4s a-laying,
Five machine guns!
Four calling cops,
Three henchmen,
Two agent Johnson's,
And a "Yippee-ki-yay!"
("I am an exceptional thief.")

On the eleventh day of Die Hard, Nakatomi gave to me:
Eleven hostages hiding,
Ten Hans a-threatening,
Nine angry bad guys,
Eight vents a-crawling,
Seven SWAT a-storming,
Six C4s a-laying,
Five machine guns!
Four calling cops,
Three henchmen,
Two agent Johnson's,
And a "Yippee-ki-yay!"
("Just a fly in the ointment, Hans.")

On the twelfth day of Die Hard, Nakatomi gave to me:
Twelve explosions booming,
Eleven hostages hiding,
Ten Hans a-threatening,
Nine angry bad guys,
Eight vents a-crawling,
Seven SWAT a-storming,
Six C4s a-laying,
Five machine guns!
Four calling cops,
Three henchmen,
Two agent Johnson's,
And a "Yippee-ki-yay!"
("Happy trails, Hans.")

No matter what your plans, “After you get where you're going, take off your shoes and your socks then walk around on the rug bare foot and make fists with your toes", it's better than a shower and a hot cup of coffee.

Merry Christmas, Happy Holidays and let's all have a healthy and happy 2026!

#Diehard #Christmas #Holidays

Do you consider the movie Die Hard a Christmas film?

Yes
0%
No
0%
Poll ended at .

Today marks Black Friday, and next week is Cyber Monday.

This year has seen a massive increase in "look alike" or spoofed sites and domains. To limit fraud remember to only use reputable sites, avoid clicking links in emails, and remember, "if it's too good to be true, it probably isn't".

#Avoid_Scams #Awareness #StopFraud

For all those working this Thanksgiving, I'm thankful for you.

#Thanksgiving #Thanks #CyberDefense

With the rise of deep‑fakes, spoofing, and realistic AI‑generated content, businesses should adopt a more robust, yet time‑tested, approach to verifying identity before initiating major account changes, processing user‑requested actions, or vetting new hires.

This approach isn’t complicated, but it does require a modest investment of time and money. It’s simply “doing business in person.” Whether it means requiring a customer to visit a bank for large financial transactions, having an employee or vendor confirm details through a verified third party, or communicating via a pre‑approved channel, the need for genuine, face‑to‑face interaction should become a core element of business policy and personal financial procedures to curb online fraud.

#StopFraud #StopScams

After several months of learning, failing, getting back up and trying again I finally finished the IBM AI Engineering Professional Certificate (V3) from Coursera and IBM!

https://www.credly.com/badges/3dcb1350-5d40-44fe-b0a5-15c908f07d87/public_url

#IBM, #Coursera

AI Agents Are Not Employees; They’re Extensions of You

The tech landscape is a buzz with people talking about agentic AI and how it can augment or potentially replace employees.

As it stands today, AI agents can make some systems more efficient and/or remove some repetitive job tasks, but AI shouldn't be treated as independent entities with it's own access and privileges, instead when an agent acts on a user’s behalf, it should adopt the users permission with the same allowances and limits.

Imagine in a corporate environment an AI agent with access to all company data is asked by someone in the marketing department about human resources or medical data. If the AI agent as a default has full data access, a potential exists for a "jailbreak" or a malicious prompt to permit access to that data. Rather, if your environment already limits access to HR/medical data the permissions of that specific user should also be limited in context to the queries and actions conducted on your behalf by an agent.

In some implementations each AI agent is seen as its own unique identity with its own standing permissions, similar to an employee, instead of an extension of the user requesting an action. This type of setup can lead to overly permissive data access, or data leakage if a user's permissions are not precisely in sync with the agent's. To reduce potential access matters, AI agents should have no access until they are tasked, then in line permissions should be given, then revoked, when no longer necessary.

The limiting of AI agent permissions to user permissions ensures security, accountability, and proper data governance; keeping control where it belongs: with the human initiating the action.

The limiting of permissions along with human confirmation when engaging in potentially dangerous acts, i.e. high dollar purchases, data deletion or escalated access permissions are a few steps that can be taken to limit malicious acts from occurring.

#AI #Cybersecurity #AIethics #Automation

Social engineering shouldn't be this easy, but there's a high probability someone would give up their credit card details.

#socialengineering #cybersecurity #cyber #hack

September 15, 2025, marks 30 years since the release of the movie Hackers (1995), starring Jonny Lee Miller,Angelina Jolie, and Laurence Mason.

It's a fun movie, terrible hacking examples, but a cultural point where hackers were made into the good guys.

#hackers_movie #hackers

One of my favorite aspects of IT and cyber security is that I'm often treated to those moments of awe and wonder with some of the amazing tech and how people utilize it.
Stolen iPhones from an Apple Store Remotely Disabled, Started Blaring Alarms - Slashdot

Earlier this week looters who stole iPhones "got an unexpected message from Apple," reports the Economic Times. "Please return to Apple Tower Theatre. This device has been disabled and is being tracked. Local authorities will be alerted." Stolen phones "were remotely locked and triggered alarms,...