It took just 1hr 26 mins from posting that I work on animal rights for some troll to appear from an internet crevice to tell me that he likes eating meat. He really managed to capture some of that old Twitter feel.
I blocked his entire domain.
remember, tonight you get to set your clock back an hour!
then tomorrow you remember the other clocks you forgot about before going to bed and go "gah!"
I started on Infosec.exchange not too long ago, and it felt so quiet compared to the horror show I came from.
Since then, my timelines have exploded. Now I find myself in an amazing chaotic good environment that scratches my hacker itch to βbreak all the thingsβ AND simultaneously manages to uphold my human requirement of others to βdonβt be a dickβ.
This place is awesome!
In the 4th post on Least Privilege, I go into more detail on best practice & technologies for implementation of Least Privilege. As always, curious to know your reactions, opinions & insights.
https://cirriustech.co.uk/blog/secbytes-least-privilege-pt4/
Welcome to the latest of my Security Bytes posts, where I dig into areas of interest in Infosec/CyberSec, and offer my opinion. In my last post, I talked about the many challenges of implementing Least Privilege. You may have been forgiven for thinking this is all just too hard to do right from day one, or to rectify from your current situation. In this post, Iβll share my opinions on the best approaches that organisations could take to improve their privileged access management position and security posture.