| https://www.linkedin.com/in/eiwelingefors | |
| Twitter (inactive) | https://twitter.com/aienswede |
| Twittodon | https://twittodon.com/share.php?t=Alienswede&[email protected] |
| https://www.linkedin.com/in/eiwelingefors | |
| Twitter (inactive) | https://twitter.com/aienswede |
| Twittodon | https://twittodon.com/share.php?t=Alienswede&[email protected] |
Infosec leaders, what resources, white papers, blogs, research have you come across regarding what an appropriate size for an infosec team is at various types and sizes of companies?
I have seen some research from Gartner and CMU. But they mostly discuss huge orgs. I'm specifically interested in orgs around 800-1000 employees in a healthcare environment. So, HIPAA and troves of ePHI. Perhaps that helps.
Whatchu got? 😁
#infosec #informationsecurity #cybersecurity #staffing #teamsize #grc
I love that Reddit is doing a Ask Me Anything on their just-announced breach involving the phishing of employee credentials.
https://www.reddit.com/r/reddit/comments/10y427y/we_had_a_security_incident_heres_what_we_know/
I’ve been having a lot of health problems recently which make it difficult to do development work, on both client or personal apps. My last client who provided occasional work has just dropped me. I can’t really take on any big client work due to my health. I am screwed unless I can sell a lot more of my own apps. Can you help me? And boost this thread?
I will reply to this post with links to some of my apps that I think some people might find useful. iOS developers should love some of them.
A threat actor is offering a service in which they let customers search for keywords across over a thousand hacked mailboxes which likely belong to corporations.
I suspect this sort of service will gain traction in coming years as hacked corporate mail access is relatively common yet not often easily monetizable.
This would allow threat actors to harvest as many webmails as they can via info-stealers infections & bruteforcing and let sophisticated groups attempt to find secrets/credentials that would allow them to perform ransomware attacks, data breaches, etc.
Second image is from www.hudsonrock.com showing the incredible amount of office365 credentials that are in the hands of hackers because of employees downloading info-stealers
current flimflam levels are 82%
(82%) ■■■■■■■■□□
Useful thread over on Twitter if you're looking for work:
Layoffs are ripping through tech as a whole and infosec teams are being hit hard. Last September, I was personally let go from an organization that laid off its entire US-based cybersecurity team. 🙄
The people pulling those levers are thinking that "nothing bad has happened yet, so why do we need these expensive folks?". Such a classic failure in reasoning.
Bad actors don't take a break just because the economy is struggling. I expect that the number of breaches will go up in the short term as companies with weakened security teams become easier targets. It's going to be a bumpy ride.