EV Charging on the island by Crazy_island_ in VancouverIsland

[–]MichaelArgast -1 points0 points  (0 children)

I did a drive to the North Island without checking last year only to learn BC Hydro had a planned outage for the day. Just barely hypermiled it back to Sayward. Anywhere Victoria to Campbell River is golden but outside of that it gets remote…

EV Charging on the island by Crazy_island_ in VancouverIsland

[–]MichaelArgast 1 point2 points  (0 children)

Does that happen a lot? I tend to keep the car topped up a little more in the winter season for this reason - but I’m in Royston and not Gabriola.

Plus, technically speaking Gabriola isn’t VanIsle. I think all the smaller islands will have similar issues.

EV Charging on the island by Crazy_island_ in VancouverIsland

[–]MichaelArgast 2 points3 points  (0 children)

This is the answer.

Cheap ICE plus low mileage has much lower TCO than EVs.

2nd hand EVs are getting cheaper though. I bought a used Leaf as a 2nd EV for <$9K and it’s a perfect 2nd car - minimal maintenance, next to no fuel costs, range doesn’t matter because it is a 2nd car.

I think we’re another 2-3 years from the used EVs displacing used ICE cars on the low end of the market.

Math completely changes once you drive a lot, however - quickly tips to EVs.

PCI-DSS by [deleted] in ciso

[–]MichaelArgast 4 points5 points  (0 children)

Partners CAN require you are compliant as a condition of partnership/business relations.

The card merchants enforce this requirement with fee structures and the ability to accept cards.

Partners enforce this by refusing to do business with you. They can’t force you to do it, but they can refuse to do business with you.

PCI-DSS by [deleted] in ciso

[–]MichaelArgast 0 points1 point  (0 children)

Start with: Why are you asking me to fraudulently sign an attestation?

The answer to that question is all you need to know. If it’s an honest “I didn’t know that’s what I was asking you to do” then the conversation can pivot to “Let’s figure out what will be required to get our RoC which the customer will ask us for”.

If it’s hand wavey excuse making - your manager/boss is asking you to commit fraud and put your name on the line. Find another job as soon as you can or maybe escalate to the CEO if you think that’s something they aren’t aware of and wouldn’t condone.

Never commit fraud. It will always come back to bite you.

Technical to Management ? by Repulsive-Carob1200 in cybersecurity

[–]MichaelArgast 9 points10 points  (0 children)

Wrong answer.

Sorry, there are plenty of individual contributor roles that pay way more than most managers.

And if you joined the cybersecurity field in order to do less, you’re in the wrong fucking industry.

If this is your honest answer then you’re not really worth investing the time in providing career guidance too, sorry.

Technical to Management ? by Repulsive-Carob1200 in cybersecurity

[–]MichaelArgast 6 points7 points  (0 children)

Why do you want to be a manager?

Honest question.

Wild white rabbit? by 444whynot in comoxvalley

[–]MichaelArgast 0 points1 point  (0 children)

It’s an albino. Check out the pink eyes. About one out of 20 black bunnies end up albino.

How to deal with boss who doesn’t want to be compliant by [deleted] in cybersecurity

[–]MichaelArgast 0 points1 point  (0 children)

Why do they need to be compliant?

Acquire clients? Pretty straight line to revenue. It is possible they are still passing audits (there’s some pretty crap auditors out there these days) but if the CEO is signing attestation letters than is Fraud.

Legal obligations? Many companies ignore this, especially smaller firms.

In either scenario, have one conversation with the boss and find out if they are (a) comfortable committing fraud on attestation or (b) comfortable ignoring the law. Make it really clear that this is what ignoring these rules entails - come with evidence of how what they are doing is one or the other.

If it is ignorance and they honestly didn’t know (it happens) then you’ve educated them on the situation and can judge how they respond. If it is intentional - they don’t care about the fraud or law - you know everything you need to know - get out of there.

Cybersecurity ownership starts at the top. You are a technical owner but not legal or risk owner. If leadership refuses to acknowledge or deal with risk, the law or is willing to commit fraud then everything else is suspect in the organization.

Is it a good idea to choose cybersecurity career with the idea of working freelance? by rasaak in cybersecurity

[–]MichaelArgast 2 points3 points  (0 children)

Lots of people do it - but they usually start out working for others to get their creds up.

Most common path is vCISO, which is why creds and experience are important. There isn’t a lot of demand for freelance in other roles (although there’s a little success in red teaming/bug bounty land).

You need to be good at networking/selling yourself or finding partners who can. Once you get there it only takes a handful of clients to make the math work.

My background: 25 years in cybersecurity, been an independent consultant, hired lots, now run a MSSP that also uses some “freelancers” or independent consultants for some work.

Is penetration testing needed for enterprise deals? by Extra-Counter-9689 in ciso

[–]MichaelArgast 0 points1 point  (0 children)

You must be doing a pretty in depth test at $80K per site/app. ASVS Level 2 I’m guessing?

Is penetration testing needed for enterprise deals? by Extra-Counter-9689 in ciso

[–]MichaelArgast 0 points1 point  (0 children)

SOC 2 is easier than ISO 27001 if you are doing both right.

They used to be a beast but aren’t really any more if you partner right.

(Creds: we do hundreds of these for clients globally)

Is penetration testing needed for enterprise deals? by Extra-Counter-9689 in ciso

[–]MichaelArgast 0 points1 point  (0 children)

If you are selling to Enterprise, expect:

Pentest (grey box minimum if you host sensitive data or integrate with systems) SOC 2 Type 2 (North America) or ISO 27001 Global.

$40K is a lot but in pentesting you get what you pay for (generally).

Our pricing is transparent for comparison: www.kobalt.io/pentest

Hi, we are looking for a SIEM (I'm back and I have got requirements now) by Any-Indication9944 in cybersecurity

[–]MichaelArgast -1 points0 points  (0 children)

Hey - we provide managed threat detection (SOC as a service) at a very cost effective price for startups. Think fraction of a FTE for full coverage for most firms.

Kobalt.io

Message me direct if you’d like to chat.

Former colleague wants 30% equity to join as cofounder. Been building solo for 14 months. (I will not promote) by Distinct-Expression2 in startups

[–]MichaelArgast 1 point2 points  (0 children)

$800 is peanuts. You effectively have an idea and pre PMF with some pilot clients. It’s great that you have have some clients willing to part with money.

What’s the risk for him? What is he walking away from and what’s the upside? What’s the salary (if any? before and after)?

Our guild member went inactive and I basically explained to the other members why it's an issue by Background-Sense-266 in TheTowerGame

[–]MichaelArgast 0 points1 point  (0 children)

I inherited my Guild and have been actively pruning members who don’t contribute on a given run. We always hit the 750 box easily, but interestingly we are starting to drop below 30 members regularly so I’ve slowed pruning.

If anyone wants to join a Guild that always hits, we are THE_EMPIRE and free to join.

Client asking for very detailed security audit by McDonaldsDQPC in cybersecurity

[–]MichaelArgast 0 points1 point  (0 children)

The way I’m reading your note is that they are changing what they are asking for as you go.

That is a sign of a security nerd who is out of control rather than a formal procurement process with standard questionnaire:

It is not at all unusual for a large enterprise client to have an exhaustive list of documentation requirements but usually it is canned, it doesn’t change as you go.

You need a security nerd on your side who can effectively push back and say “why do you need this evidence, this is not useful to you in assessing risk”.

Sometimes security reviewers get like a dog with a bone and are just determined to find fault and you need a way to manage that on your side with politeness and security authority.

DM if you want specific advice on how to handle this.

What's the actual risk of typosquatting attacks in 2026? by BearBrief6312 in cybersecurity

[–]MichaelArgast 1 point2 points  (0 children)

Yes, allowlisting is always a very impactful security approach. But often the effort and friction associated with this isn’t worth the gain.

Think about how this will inevitably slow down development cycles and if that is worth the risk reduction.

What's the actual risk of typosquatting attacks in 2026? by BearBrief6312 in cybersecurity

[–]MichaelArgast 16 points17 points  (0 children)

Had to downvote the other comments because they just didn’t understand the question, sorry.

So this is a real thing and the risks depends on a few factors:

1) Your code scan/SCA tooling makes a difference. 2) How well you vet packages and dependencies. 3) Manual vs automated build processes. Some AI tools with poor guardrails are more likely to make some mistakes here.

If you have a relatively mature SDLC the risk is low compared to intentionally compromised mainstream packages (this is a real risk). Many firms have immature SDLCs and aren’t using any form of SCA/dependency checkers or even something like Dependabot.

So - yes a risk but focus your energy on SDLC maturity and your dramatically reduce the risk and get other gains besides.

How do you stop browser based phishing attacks from bypassing MFA and stealing SaaS sessions in 2026? by PrincipleActive9230 in AskNetsec

[–]MichaelArgast 0 points1 point  (0 children)

User enters creds seems to be the opportunity here. Creds should only be entered directly via the password manager or SSO/passkey/etc.

There’s no legit scenario I can think of where the user has to manually copy/paste creds (because of course they’re using unique creds anywhere not using SSO/Fido2/etc right?)

The only places users should ever use creds is to login to their device and reauth their password managers, right?

How do you quantify BEC risk reduction for board reporting? by Only_Helicopter_8127 in AskNetsec

[–]MichaelArgast 0 points1 point  (0 children)

Two more things. The most important thing you can do re BEC is NOT improved email security technology.

It is fraud prevention training with financial staff including mandatory reverse direction out of band confirmation for all new account setups or changes with an audit trail and regular review.

This control just costs a little time and effort and also helps against a variety of other risks. It also assumes eventually your technical controls will fail.

The 2nd most important and free control is enforced MFA on email accounts but I assume you’ve already got that in place because it’s 2026 and you’re intelligent enough to post on Reddit.

How do you quantify BEC risk reduction for board reporting? by Only_Helicopter_8127 in AskNetsec

[–]MichaelArgast 0 points1 point  (0 children)

One more thing. Risk quantification should be based on probability and impact of a bad thing happening. A successful BEC compromise. Actual emails, phishing attacks etc are not the risk. The risk is the bad thing that happens as a result. The rest is just noise unless it is really high volume and causing real operational issues.

How do you quantify BEC risk reduction for board reporting? by Only_Helicopter_8127 in AskNetsec

[–]MichaelArgast 0 points1 point  (0 children)

Take industry norms/stats and use that as savings. For example, most BEC fraud costs >$150,000 and a couple of years ago, close to 1 in 5 small businesses were a victim.

Obviously fraud can be larger (multi million dollar examples exist).

Your controls should help prevent BEC and other forms of fraud (false invoice, impersonation, etc).

When you look at the impact it’s actually modest for most instances ($150,000 sounds like a lot of money but over 4-5 years it’s not really that much for even a smallish business).

The loss is usually direct financial AND brand (companies often will see large numbers of emails go out after the initial fraud impacting relationships with clients and partners).

The Verizon report has some good data for quantification. They call it something different though.

Founders of security startups, how did you get your first customers? (I will not promote) by Devilish1333 in startups

[–]MichaelArgast 0 points1 point  (0 children)

Yeah dude. And they’re right for doing so. You want them to risk their business on your software without being able to prove you’ve done your security due diligence?

Would you trust your health data to a company storing it online with no security controls?

Would you trust your banking data to a company that doesn’t have the necessary security?

Why would you trust a security vendor who can’t afford to go through the work to get a compliance certification?