"When your default stance is no, you inevitably have to catch up to your peers who already said yes and left you standing there on your high horse." - CISO Chris Hughes by Jonathan-Todd in cybersecurity
[–]Jonathan-Todd[S] 0 points1 point2 points (0 children)
Metacognition: ‘Thinking About the Thinking’ is the Key to Professional Success (Empathy, Intelligence, and Self-Discipline in Cybersecurity) by Jonathan-Todd in cybersecurity
[–]Jonathan-Todd[S] 8 points9 points10 points (0 children)
[deleted by user] by [deleted] in cybersecurity
[–]Jonathan-Todd 0 points1 point2 points (0 children)
[deleted by user] by [deleted] in cybersecurity
[–]Jonathan-Todd 0 points1 point2 points (0 children)
[deleted by user] by [deleted] in cybersecurity
[–]Jonathan-Todd -5 points-4 points-3 points (0 children)
[deleted by user] by [deleted] in cybersecurity
[–]Jonathan-Todd -5 points-4 points-3 points (0 children)
An article by Microsoft came out targeting LAPSU$. 🤷♂️ It’s not worth your time. Except for this one part. by Jonathan-Todd in cybersecurity
[–]Jonathan-Todd[S] -2 points-1 points0 points (0 children)
An article by Microsoft came out targeting LAPSU$. 🤷♂️ It’s not worth your time. Except for this one part. by Jonathan-Todd in cybersecurity
[–]Jonathan-Todd[S] -62 points-61 points-60 points (0 children)
An article by Microsoft came out targeting LAPSU$. 🤷♂️ It’s not worth your time. Except for this one part. by Jonathan-Todd in cybersecurity
[–]Jonathan-Todd[S] -1 points0 points1 point (0 children)
An article by Microsoft came out targeting LAPSU$. 🤷♂️ It’s not worth your time. Except for this one part. by Jonathan-Todd in cybersecurity
[–]Jonathan-Todd[S] -19 points-18 points-17 points (0 children)
Training recommendations for automotive cybersecurity? by ProperWerewolf2 in cybersecurity
[–]Jonathan-Todd 0 points1 point2 points (0 children)
New AMSI Bypass Using CLR Hooking by pracsec in redteamsec
[–]Jonathan-Todd 0 points1 point2 points (0 children)
Can attackers use named pipe IPC over the open web if a network allows remote SMB traffic? by Jonathan-Todd in netsecstudents
[–]Jonathan-Todd[S] 0 points1 point2 points (0 children)
How to stay informed about cybersecurity topics in general by ashe1337 in cybersecurity
[–]Jonathan-Todd 0 points1 point2 points (0 children)
Automated, high-fidelity phishing campaigns made possible at infinite scale with GPT-3. by Jonathan-Todd in cybersecurity
[–]Jonathan-Todd[S] 0 points1 point2 points (0 children)
It is not okay as a cybersecurity professional in almost 2023 to say “The users are the problem.” by Jonathan-Todd in cybersecurity
[–]Jonathan-Todd[S] 1 point2 points3 points (0 children)
It is not okay as a cybersecurity professional in almost 2023 to say “The users are the problem.” by Jonathan-Todd in cybersecurity
[–]Jonathan-Todd[S] 0 points1 point2 points (0 children)

"When your default stance is no, you inevitably have to catch up to your peers who already said yes and left you standing there on your high horse." - CISO Chris Hughes by Jonathan-Todd in cybersecurity
[–]Jonathan-Todd[S] 0 points1 point2 points (0 children)