Vincent Andino

79 Followers
48 Following
28 Posts
Blue Teamer && Turtle Dad ❀ Engaged
@paco Thanks for adding me onto the infosec list/seedfile. What you're doing is incredible and invaluable for newcomers, especially. I'd like to nominate you to that list too πŸ˜‰β€‹

It took just 1hr 26 mins from posting that I work on animal rights for some troll to appear from an internet crevice to tell me that he likes eating meat. He really managed to capture some of that old Twitter feel.

I blocked his entire domain.

Humans are weird.

remember, tonight you get to set your clock back an hour!

then tomorrow you remember the other clocks you forgot about before going to bed and go "gah!"

About to board for London to teach #FOR508 next week. Any #infosec friends in the city down for a 🍻 or β˜•οΈ, lmk! @shortstack arrives Wednesday 😎
To give a sense of scale, infosec.exchange has twice as many active accounts/connections as we did on Thursday. And it’s growing
πŸ‘‡πŸ˜πŸ˜†πŸ˜‚πŸ€£πŸ’œ

I started on Infosec.exchange not too long ago, and it felt so quiet compared to the horror show I came from.
Since then, my timelines have exploded. Now I find myself in an amazing chaotic good environment that scratches my hacker itch to β€œbreak all the things” AND simultaneously manages to uphold my human requirement of others to β€œdon’t be a dick”.

This place is awesome!

In the 4th post on Least Privilege, I go into more detail on best practice & technologies for implementation of Least Privilege. As always, curious to know your reactions, opinions & insights.

https://cirriustech.co.uk/blog/secbytes-least-privilege-pt4/

#SecurityBytes #informationsecurity #leastprivilege

Security Bytes: What is Least Privilege and why you should care about it - Lets fix this

Welcome to the latest of my Security Bytes posts, where I dig into areas of interest in Infosec/CyberSec, and offer my opinion. In my last post, I talked about the many challenges of implementing Least Privilege. You may have been forgiven for thinking this is all just too hard to do right from day one, or to rectify from your current situation. In this post, I’ll share my opinions on the best approaches that organisations could take to improve their privileged access management position and security posture.

CirriusTech | Serious About Tech
Hello World