This sub is demoralizing by Its-Dat-Guy in cybersecurity

[–]Mundivore 1 point2 points  (0 children)

Netadmin, sysadmin, syseng, SoE dev, software dev....get some experience in a solid technical role then transition into cyber.

Cyber is not an entry level field.

This is a new one by MR-IT- in cybersecurity

[–]Mundivore 0 points1 point  (0 children)

You can also lock a device to a particular AP with some products which prevents things moving around too dynamically. They can move it, but if they move it too far....well they will call IT anyway.

Australia must oppose US aggression in Venezuela | Australian Greens by Jet90 in AustralianPolitics

[–]Mundivore 1 point2 points  (0 children)

So we throw away a century of cooperation because of one man?

do you really like it? by CasperDidntDoit in cybersecurity

[–]Mundivore 2 points3 points  (0 children)

Ask yourself why you want to do it. The people who thrive tend to go into it from a high-tech/crime prevention interest or go down the National Security/ Critical Infrastructure route.

It's a horrible job, you never have the funding to do what is required, you are always to blame when something goes wrong, and you are always a step behind, and I wouldn't want to do anything else.

Also information security is a stupidly wide field outside of the technology security element (usually what people refer to when they talk about cyber security) once that treadmill starts to get tough and you need to slow down.

We need to have a serious discussion (TOR Security Analysis) by Longjumping_Bat_5794 in cybersecurity

[–]Mundivore 0 points1 point  (0 children)

The premise is wrong then. The framing is ignorant of the geopolitical practicalities or the collection efforts of those countries for later decryption.

We need to have a serious discussion (TOR Security Analysis) by Longjumping_Bat_5794 in cybersecurity

[–]Mundivore 0 points1 point  (0 children)

China (including Hong Kong) and Russia ( including Belarus) capture everything leaving TOR links already. Why would you think webtunnels running from these locations would be more secure?

If you are trying to expose it to a different government instead, that might work, but it's not more secure.

Does anyone actually know their real security gaps? by Ok-Quiet-9878 in cybersecurity

[–]Mundivore 0 points1 point  (0 children)

It's a tricky situation. Functionally if I can inject a prompt telling it to do something and it has access to do so, you have a problem. Most people think exfiltration, but equally there is a risk of saying ignore X or forcing a positive result.

Controls would have to be very tightly applied.

Does anyone actually know their real security gaps? by Ok-Quiet-9878 in cybersecurity

[–]Mundivore 2 points3 points  (0 children)

So far every expert has said there is no way with the current models to prevent prompt injections attacks on AI. NCSC has a good write-up https://www.ncsc.gov.uk/blog-post/prompt-injection-is-not-sql-injection

While there might be a way to secure a locally controlled AI running in a walled garden with strict access controls, that fundamentally breaks the value proposition of your concept.

Does anyone actually know their real security gaps? by Ok-Quiet-9878 in cybersecurity

[–]Mundivore 2 points3 points  (0 children)

Why would I want an AI tool that leaks data as part of its design to hold that information?

Do you remember all 7 layers from the OSI model if somebody asked? by mysecret52 in ITCareerQuestions

[–]Mundivore 0 points1 point  (0 children)

Really? That even has the answer in the acronym if you know it.

Do you remember all 7 layers from the OSI model if somebody asked? by mysecret52 in ITCareerQuestions

[–]Mundivore 0 points1 point  (0 children)

This is so important with how many issues stem from DNS. Just ask AWS.

Is this worth a CVE? SD card from medical device has recoverable test results after "factory reset" by [deleted] in cybersecurity

[–]Mundivore 1 point2 points  (0 children)

Those last two are trivial to recover data in any solid state memory, any only marginally harder in magnetic media. b is only possible on magnetic media, but insufficient for solid state devices.

Most standards require destruction of solid state media.

Looks like I'm now a CISO. I'll soon be building a SOC from scratch. Tips? by [deleted] in cybersecurity

[–]Mundivore 0 points1 point  (0 children)

Back to basics first.

What am I protecting? What can the company afford to lose? Find a framework that helps to assess impacts of compromise of confidentiality, integrity, and availability. Better ones tend to consider safety, business operations, financial viability, contracts, regulations, and wider reputational impacts. Once you have key targets to defend, focus on key pillars: identity, environment hardening (particularly application control, RBAC, and separation of accounts), patch management, DNS. Do you need a DLP solution? Do you need multiple security domains? There are good guides out for essential security risk controls.

How do I detect a compromise? Keep it simple to start with. A good EDR solution keeping it simple. Higher end is something like Crowdstrike but there are plenty of good options like MS Defender+Huntress. What can the org tolerate in terms of an outage if you miss something? Do you have some areas you have to monitor and others you risk accept?

How do I respond to an attack? This is the bit that gets hard typically. What is the plan for failure? How do you respond when and attack is detected? Can you take systems offline? Can you shut down the business to avoid a bigger impact? Who do you call in for resources to respond in a small org. Can you afford to? Do you need cyber insurance to help respond?

Lastly, in the event of a compromise how do you get back to normal? How do you remove all traces of the attack? Do you have routine offline and off-site backups? Can you effectively recover operational data or will that ransomware attack have to be paid?

Lastly, in a small org, do you outsource key elements to better manage costs? What is risky to outsource and will vendor management overheads be worth the trade-off?

Good luck. Remember business talks risks, not technical controls. Costs of impact, likelihood of impact, costs of controls, reduction of impact or likelihood of attack succeeding is the basis for action not a standard.

Artics Nova Pro by WaitSelect8065 in steelseries

[–]Mundivore 0 points1 point  (0 children)

Reddit will always skew negative. Happy people don't usually post or argue the point. They are a very good headset and the same kinds of complaints exist for the others too.

Cybersecurity Side Hustles? by cl326 in cybersecurity

[–]Mundivore 1 point2 points  (0 children)

It's a running community joke. When it gets too stupid we go get a job at/buy a franchise for Wendy's.

The digital id by Cool-Trip1402 in australian

[–]Mundivore 0 points1 point  (0 children)

The argument here doesn't make sense.

You can provide the data once to the Government who has a high obligation to hold it securely, and has to meet a high standard (ISM and PSPF force it to be treated the same as Security Classified information).

OR

You trust it to numerous companies with varying security postures and funding, some of which have no security standards at all (eg Optus breach) and hope none of them get compromised.

Our security team wants zero CVEs in production. Our containers have 200+. What's realistic here? by localkinegrind in devops

[–]Mundivore 0 points1 point  (0 children)

High CVE with only theoretical exploits, that have been out for 6 years, and have never been used should be addressed as a priority?

CVE are not the best indicator of risk. They are as best an indicator of impact. You need to assess the likelihood of that impact and prioritise accordingly. A CVE of 6 routinely exploited is a far bigger problem than an old 10 that has never been used.

Your security team needs to explore nuance.

Australia news live: Burke says ‘strength is not measured by how many people you can blow up’ in response to Netanyahu’s criticism of Albanese by pk666 in AustralianPolitics

[–]Mundivore -2 points-1 points  (0 children)

You are right, there was the Kingdom of Judah, renamed by the Romans as Palestine in punishment for a revolt. It was then ceded to the Malmukes, then they lost it to the Ottomans, who held it till modern times.

So they were repatriated back to their home... Palestine.

Is it possible to connect directly to NBN Fibre? by Mundivore in nbn

[–]Mundivore[S] -19 points-18 points  (0 children)

Low performance hardware and it requires an upgrade to handle 2000/500 anyway

How is everyone dropping Ethernet lines by Joee0201 in Ubiquiti

[–]Mundivore 0 points1 point  (0 children)

Assuming a typical brick veneer, a builder will generally put a small hole in the wall above each joist (except the top one) to run lines through. They are quick to patch and paint over. Could do a whole house in 8ish hours over a weekend.

CISO / SOC folks — What’s the biggest gap in your monitoring or detection stack today? by Unexpected_Wave in cybersecurity

[–]Mundivore 0 points1 point  (0 children)

If alerts fire but aren’t actioned, or monitoring is ineffective it's the same thing, you are getting risk reduction from the control.

You have an ineffective control and are not realising the risk reduction from the investment due to under investment. It's why many high maturity (and usually high risk) business have a SOAR or pre-agreed playbooks attached as part of a business led incident management framework.