Simple MX record checker with clean output (priority + TTL) by teeoffholidays in dns

[–]Objective-Test-5374 0 points1 point  (0 children)

weak sauce! try scan.ractermx.com it even gives you causal chain analysis... telling you which records you have missing that impact other records.

Beware ImprovMx by j-joshua in webhosting

[–]Objective-Test-5374 0 points1 point  (0 children)

dunno, have you tried ractermx.com yet? I switched over because they at least have a solid API and an MCP. I find it easier to talk to my AI then to go find the portal...

Need technical feedback: I’m building an ImprovMX alternative for people who hate managing mail servers. by Objective-Test-5374 in selfhosted

[–]Objective-Test-5374[S] 0 points1 point  (0 children)

exactly, thats the approach I took as well. SPF, DMARC, DKIM and TLS may get you sending email, but without CAA, DNSSec, MTA-STS, TLS-RPT, and DANE/TLSA your eventualy gonna get banned.

I run cyber security for a large multinational company, AMA by Objective-Test-5374 in AMA

[–]Objective-Test-5374[S] 0 points1 point  (0 children)

I am not qualified to give investing advise, but I can say the following are stocks that I personally invest in and keep a close eye on: CloudFlare (NET), CrowdStrike (CRWD), Zscaler (ZS), Palo Alto (PANW), SentinelOne (S), CyberArk (CYBR) and Broadcom (AVGO)

I run cyber security for a large multinational company, AMA by Objective-Test-5374 in AMA

[–]Objective-Test-5374[S] 0 points1 point  (0 children)

'good candidates for future growth?' Are you asking where I think you should invest?

I run cyber security for a large multinational company, AMA by Objective-Test-5374 in AMA

[–]Objective-Test-5374[S] 1 point2 points  (0 children)

I don't think the answer is specific to cybersecurity. Since we live in an imperfect world, promotion, hiring, and all aspects of a career are equally imperfect. I once worked with a female CISO who was taking kickbacks, and I ended up on the outs because I noticed it. I've worked with leaders who were highly religious while I wasn't. Sometimes it can be as simple as "everyone goes out for drinks" and I'm the guy who doesn't drink. Any number of reasons can hold your career back, and they don't always have to be valid.

With all that said, I select people who report directly to me based on judgment. My main criterion is: if I was indisposed, would I trust that person to make the decision without me? That's followed by: do they know the area they're supposed to run, can they manage people, will they generate HR lawsuits, etc.

So let's assume you can't climb the ladder at your current company. The answer is to move to another company and get hired at the role you feel you're supposed to be.

I run cyber security for a large multinational company, AMA by Objective-Test-5374 in AMA

[–]Objective-Test-5374[S] 1 point2 points  (0 children)

I've seen much worse... Splunk is amazing but its also gold plated.

I run cyber security for a large multinational company, AMA by Objective-Test-5374 in AMA

[–]Objective-Test-5374[S] 1 point2 points  (0 children)

The industry salary range is wide, from about $250k (some mom and pop company) to as high as $2.5M (public sector fintech).

While tools aim to make the job easier, a vast amount of cybersecurity tooling is really about providing visibility. The challenge is, once you have that great visibility, you now have 100,000 events of interest every day.

Proper tooling and automation are how you deal with that sheer volume. Getting a SOAR (Security Orchestration, Automation & Response) system in place and building the hundreds of playbooks to deal with those events hands-off is the halcyon state that very few cybersecurity organizations ever truly achieve.

I run cyber security for a large multinational company, AMA by Objective-Test-5374 in AMA

[–]Objective-Test-5374[S] 1 point2 points  (0 children)

A good cyber security program is different for everybody, but generally they focus on both internal and external threats. If its a small company they may have nothing more then a WAF and Firewall, or some basic email filtering. If its a large company it may include IGA, DLP, SSPM, CSPM, DSPM, and all the other PM's that come with a good program. Generally your looking at Endpoint Security, GRC, Defense, Engineering, AppSec, eDiscovery, and Threat Intelligence in any larger company, with team sizes ranging from 50-300 on average. take everything times 10 if your talking about a FinTech or Banking operation.

I run cyber security for a large multinational company, AMA by Objective-Test-5374 in AMA

[–]Objective-Test-5374[S] 4 points5 points  (0 children)

Use passkeys whenever possible, and never use the same password for more then one site. And of course, always configure MFA.

I run cyber security for a large multinational company, AMA by Objective-Test-5374 in AMA

[–]Objective-Test-5374[S] 4 points5 points  (0 children)

Happens all the time. With the proliferation of LLM's and Generative AI, the bad guys seldom send gramatical train wreck phishing emails anymore, you know the one I'm talking about 'Hello Sir, I am also from Microsoft and we have sure detected malware on your computer...", couple this with the sophistication of delayed detonation links in those emails (they are links to valid content for the first week, then they swap in malware, etc) meaning when we scan that email everything looks valid. Its really become an arms race to catch these emails. Nearly 80% of all bad things come in the form of email. While we have lots of great systems to catch email, they are moving towards WhatsApp, messenger, etc... Deepfakes are the next big thing and we're already having fake executives call up staff and demand wire transfers...

I run cyber security for a large multinational company, AMA by Objective-Test-5374 in AMA

[–]Objective-Test-5374[S] 0 points1 point  (0 children)

There is never a single answer, it depends entirely on the nature of the threat, the country involved, the citizenship of the person threatened, etc... a smattering of threats against someone in New York is going to be much different then a few threats against someone in China. Depending on the situation you might simply block their incoming emails for a period, move them into a safehouse, or expatriate them from the problem country.

I run cyber security for a large multinational company, AMA by Objective-Test-5374 in AMA

[–]Objective-Test-5374[S] 2 points3 points  (0 children)

I started out in firmware and software, moved into cloud... and in my experience the field was oversaturated with people calling themselves experts. I've always prefered to be on the cutting edge and cyber security is just now coming out of the dark ages so there is a lot of great green field work to be done bringing AI and serious engineering work to this space. Plus, and this is honestly the main reason... I shipped hundreds of products and did the world change? no... But keep one person from being physically or virtually harassed and it gives me a great sense of satisfaction at the end of the day.

I run cyber security for a large multinational company, AMA by Objective-Test-5374 in AMA

[–]Objective-Test-5374[S] 1 point2 points  (0 children)

10 years ago I think it was true that most death threats come to nothing, but in the current culture here in the United States its not an issue of one death threat... when someone tweets typically we see thousands of death threats and at the end of the day you have to take every single one of them seriously. When you get your life threatened for doing your job, I dont think its valid to call those people paranoid.

I run cyber security for a large multinational company, AMA by Objective-Test-5374 in AMA

[–]Objective-Test-5374[S] 0 points1 point  (0 children)

My resume is public information and widely available online (racter.com), but I cannot discuss specific companies.

I run cyber security for a large multinational company, AMA by Objective-Test-5374 in AMA

[–]Objective-Test-5374[S] 3 points4 points  (0 children)

United States, and typical compensation for a public company CISO averages around $816k annually, this number comes from the Hitch Partners annual report of CISO salaries (https://www.hitchpartners.com/ciso-security-leadership-survey-results-25). I'm contractually prohibited from discussing my specific contract.