| https://twitter.com/operant | |
| Keybase | https://belldavidr.keybase.pub |
| Callsign | W3DRB |
| web | https://operant.io |
| Location | Virginia Beach, USA |
| https://twitter.com/operant | |
| Keybase | https://belldavidr.keybase.pub |
| Callsign | W3DRB |
| web | https://operant.io |
| Location | Virginia Beach, USA |
I keep forgetting to mention this little trick.
One of the most effective Cybersecurity tools at an enterprise, costs nothing, and if you can get it - access to the list of charges people put on corporate cards.
You’ll find shadow IT in the form of SaaS signups.
You’ll see charges at Best Buy for wireless access points and unmanaged switches.
OpenAI subscriptions.
AWS charges for accounts you never knew about.
As the old saying goes. You want answers? Follow the money.
I was reminded of this today for no particular reason ;)
James Mickens’ “Mossad/not-Mossad Duality” in threat models
Great reporting showing the combination of cyber and physical security threats by nation state group.
Requiring less than 10 minutes to watch, this is a video you should absolutely be using to evangelize security concerns with stakeholders.
https://youtu.be/0xlq4WSpUH8