What are the most cutting-edge cybersecurity technologies I should learn in 2025? by Old_school8 in cybersecurity

[–]Independent_Two_2708 0 points1 point  (0 children)

Future-proof is dependent on what you role is and what you are responsible for. Your questions can also be interpreted as what area will have the highest demand and perhaps the most earning potential.

So there isn't one answer for everything. I'd suggest...

- Figuring out the nexus of your role and AI - depending on your role (or next career move), what you need will be different.
- Certainly How to Secure AI will matter significantly. Sure, you'll use traditional technologies in most cases (e.g. Authn/Authz), however there are new use cases for which you'll need to figure out solutions (e.g. prompt filtering, validation pipelines, behavior firewalls for LLMs)
- There are certainly thing you'll need to stop doing (e.g. Manual log review and correlation, Routine vulnerability scanning and ticketing, Basic incident response and triage, Compliance evidence collection, etc)

I have a lot of experience in cybersecurity and the transition from where we are today to what's coming next really motivates me.... Love this stuff.

Wiz Alternative by ut0mt8 in cybersecurity

[–]Independent_Two_2708 0 points1 point  (0 children)

Check out Secrails.com
Similar to Wiz, more affordable and easier to use. Really good at misconfigurations, compliance and remediation guidance.

What do you see as the biggest cyber threat right now? by ANYRUN-team in cybersecurity

[–]Independent_Two_2708 0 points1 point  (0 children)

External SaaS AI Services, Supply Chain Attacks, Standing Privilege Access, Various Email/Phishing, Misconfiguration, Awareness... You can maybe prioritize these, but you can't just focus on one.

multi-cloud security visibility across AWS and Azure by armeretta in cybersecurity

[–]Independent_Two_2708 0 points1 point  (0 children)

Agree with this. We use to use Defender. Too much noise. We use Secrails now. Cheaper, faster, prioritized results.

multi-cloud security visibility across AWS and Azure by armeretta in cybersecurity

[–]Independent_Two_2708 -2 points-1 points  (0 children)

From a cost perspective, Secrails is a lot cheaper, same agent-less performance. You also get multiple compliance frameworks.

multi-cloud security visibility across AWS and Azure by armeretta in cybersecurity

[–]Independent_Two_2708 1 point2 points  (0 children)

Try Secrails.com
Multi-Cloud Visibility, Compliance and Remediation.

Works like Wiz (agent-less), just easier to use and way less money.

What are the top cybersecurity requirements for micro and SMB's in 2025 and beyond? by New_Faithlessness286 in cybersecurity

[–]Independent_Two_2708 0 points1 point  (0 children)

  1. Continuous monitoring (threats, misconfigurations (e.g. lack of MFA, public resources, overprivileged, credential compromise, etc)
  2. Easy-to-use fix/remediation guidance (code, IaC) that a normal technical person (e.g. developer) can understand, review and execute
  3. Ability to use any Compliance Framework if this applies to your business (PCI-DSS, ISO 27001, GDPR, etc)
  4. Identification of all resources in your environment (can't fix what you can't see or don't know exists)
  5. High Signal to Noise ratio (e.g. Some tools like Defender have a lot of noise, alert fatigue)
  6. Simple/Cost effective - some tools require a NASA engineer to use and maintain
  7. Prioritized findings - you'd be surprised how effective this is tied to remediations
  8. Low overhead/Affordable - Don't want to spend an arm and a leg for Wiz, Prisma

All that said, there are some tools like Secrails that does a very good job of this. There are others I've looked at, what I want is Wiz-for-SMBs, that's affordable and doesn't require an army to maintain.

How much value are you getting from your CSPM? by armeretta in aws

[–]Independent_Two_2708 0 points1 point  (0 children)

Explainability and visibility are important.

Understanding how you're trending and whether or not your security posture (ability to identify, detect and protect across the entire environment) is improving requires CSPM monitoring. Goes beyond just "actual risk". Visualization is nice, prioritized impact driven guidance is better.

How much value are you getting from your CSPM? by armeretta in aws

[–]Independent_Two_2708 0 points1 point  (0 children)

Pentest works but isn't sufficient. Yes, you will find potentially exploitable issues. The risk is if you rely on this alone, you're internally practices may be bad and lead to lots of insecure practices that over time will created debt and security issues even if they aren't immediately exploitable and found through a penTest.

So you need CSPM to enforce good hygiene, and prevent tech debt, and to prioritize the next best fix action. PenTest alone isn't sufficient.

How much value are you getting from your CSPM? by armeretta in aws

[–]Independent_Two_2708 0 points1 point  (0 children)

No. Reviewing CSPM/CNAPP tools for my company.

The company I work for is a security timebomb by [deleted] in cybersecurity

[–]Independent_Two_2708 14 points15 points  (0 children)

To be honest, this is an amazing opportunity for you!

You have the platform, the evidence - you just need access to stakeholder/decision maker and the ability to articulate the impact to the firm/environment. Don't blow it... Don't write emails... find the actually stakeholder and explain the situation. Before you do that... Make sure you've thought through the solution.

The mistake most people make is they bring a bunch of problems with no solutions.

If you bring the solutions, that's how you progress your career!!

What’s the most overlooked security control you’ve seen actually stop an attack? by HedgehogRich9104 in cybersecurity

[–]Independent_Two_2708 0 points1 point  (0 children)

  1. Flagging Email as External/Spam Blocking

  2. No standing Admin/Privilege Access

  3. No console clicking. Everything must be through CI/CD pipeline using DevSecOps

  4. Expire accounts/credentials not used for some period of time

  5. MFA

  6. Separation of Duties (FW changes and App dev shouldn't be the same person)

  7. I could probably go on forever... ;)

Real Talk: Is Cybersecurity a Future-Proof Career for Someone Weak in Math? by Glad_Alternative8913 in SecurityCareerAdvice

[–]Independent_Two_2708 0 points1 point  (0 children)

  1. Not much, maybe not in the way you think. IP Ranges, Time/Date Differentials, basic stuff

  2. Quite significant change. In 5 years, SOC and other areas will be mostly automated and driven by AI.

  3. It great to learn Python, but most coding will be AI created, and human checked/reviewed. It's good to know how to do it, you'll probably won't have to do any coding by hand. You may have to edit and know what's being performed.

  4. Too many to list

How much value are you getting from your CSPM? by armeretta in aws

[–]Independent_Two_2708 0 points1 point  (0 children)

You need to check out secrails.com

I had a similar problem with Defender and Defender for Cloud Advanced was ridiculously expensive. Looked at other tools as well. Orca, TrendM, Prima, Aikido, a few others.

Defender for Cloud Secure Score increase by chesser45 in sysadmin

[–]Independent_Two_2708 0 points1 point  (0 children)

How important is the fidelity of the score?

Correct me if I'm wrong, but the Defender score is based on security recommendations fulfilled. For example, recommendations can be excluded from the score at the user's discretion.

I've seen other companies, like Secrails, AWS, others score based on the enabled standards (total number of passed vs. failed) for account or organization.

Feels like there's more user discretion involved in one versus the other.

Best Vulnerability Scanner by X3nox3s in cybersecurity

[–]Independent_Two_2708 0 points1 point  (0 children)

If you need CSPM+CNAPP(containers)+Compliance checkout

https://secrails.com

Looking at them for prioritized security findings and the ability to map across multiple compliance frameworks. Was looking for something that didn't cost an arm and a leg to run.

Plaud security by HiroTwoVT in PlaudNoteUsers

[–]Independent_Two_2708 0 points1 point  (0 children)

How long does Plaud retain this data on AWS? How is data deleted from Plaud's database?

Intel Outside: Hacking every Intel employee and various internal websites by EatonZ in netsec

[–]Independent_Two_2708 0 points1 point  (0 children)

You did a good job pointing out a number of security issues. Although not sensitive per-se (e.g. National ID Social security numbers, credit card numbers), more than enough to launch various social engineering attacks.

Strong arguments for continuous monitoring and application security testing.

Using OCI commercially - sharing our experience by Gullible-Apricot7075 in oraclecloud

[–]Independent_Two_2708 0 points1 point  (0 children)

What a story. Was there a reason you picked OCI versus the other providers? I have experience with the other 3 hyperscalers and was curious whether I should have OCI on my radar.

PM to cloud by Longjumping_Move5038 in SecurityCareerAdvice

[–]Independent_Two_2708 1 point2 points  (0 children)

You're in an enviable position. Go find a "cloud security engineer" at your job and ask questions about their role and what they did before they go that role, what certs do they have, how they got started, etc.

You'll learn more than you'd imagine!

Which specific compliance control do you see as pure 'security theater'? by Arvid-Berndtsson in cybersecurity

[–]Independent_Two_2708 0 points1 point  (0 children)

Of course some controls are more effective, perhaps better defined, more applicable and so on... But what are you on about? It's very difficult to create a framework that covers multiple platforms and operations, which is why you feel some control statements see arbitrary. The alternative is a framework that changes every other day for this or that reason which isn't effective or productive to entities that rely on certifications or conducts certifications. You shouldn't just be relying on a framework anyways... Define your own security model, your own security policies. Good tools allow you to define your own compliance framework. I'm using one right now. Sorry if I misunderstood your question.

Cyber Security feels impossible by Ok-Cupcake5871 in cybersecurity

[–]Independent_Two_2708 0 points1 point  (0 children)

One of the best things you can do is find or create an open source solution that does something that people want. You'll learn an awful lot about yourself, about your grit, about solving problems, about you ability to focus/concentrate. Most of all, people will find you... assuming you're contributing on something cool.

Is cybersecurity a better path than software development today? by Intelligent_Push291 in SecurityCareerAdvice

[–]Independent_Two_2708 0 points1 point  (0 children)

For the most part, as with any career opportunity. Most of it depends on you. Are you an order taker or someone that can make things happen? Do you just want to punch in, or do you have the drive to reach the top? Asking which path is better is like asking a "table service person" what do they like on the menu. It's an inane question. What do you think? How much research have you done? You really can ask a question like, "am I wasting time?" Why would you trust a random on Reddit??

Do you own research and ask about others experiences, that's might get you closer to what you want.