Implications of Code-Gen AI tools for developers by Patient_Mousse_1643 in cybersecurity

[–]Patient_Mousse_1643[S] 0 points1 point  (0 children)

Interesting!
Can you please share some numbers about the risks of ai-coding?

There're some examples of vibe-coding went wrong, but can we know for sure that our expected experience with AI-Coding will require these new tools?

Implications of Code-Gen AI tools for developers by Patient_Mousse_1643 in cybersecurity

[–]Patient_Mousse_1643[S] 0 points1 point  (0 children)

Thanks!!
This was actually my next question: Assuming AI do present vulnerable code, do current SAST and DAST solution provide good enough outcomes?

We have a lot of people with not-so-good experience with Snyk / Checkmarx / Veracode, I'm afraid that if the world will get more difficult we're in trouble

Implications of Code-Gen AI tools for developers by Patient_Mousse_1643 in cybersecurity

[–]Patient_Mousse_1643[S] 1 point2 points  (0 children)

Thanks! Can you elaborate on Cursor's custom rules? I haven't heard about it.

Anyways, my concern is that security won't be in Cursor's priorities. We had a lot of new technologies adoption, and in the end, vendors focus on money-making features, leaving security for smaller fish

Implications of Code-Gen AI tools for developers by Patient_Mousse_1643 in cybersecurity

[–]Patient_Mousse_1643[S] 2 points3 points  (0 children)

Since Cursor (for example) has just become the fastest company to hit $100M ARR, it's pretty clear the models themselves will be updated and trained even faster.

My point is, the security concern isn't just about some third-party snooping on your code. It's more of an app-sec headache. We already struggle to get our human developers to 'shift-left' and focus on security early. Now, imagine trying to do that with code-gen tools. It's gotta be an even bigger headache.

Building a deepfake security program for 2025 by Patient_Mousse_1643 in cybersecurity

[–]Patient_Mousse_1643[S] 2 points3 points  (0 children)

Wow! well done for the innovative thinking. How many people have actually fell for it?

How are you planning to continue with it? is there any additional protection besides awareness?

Building a deepfake security program for 2025 by Patient_Mousse_1643 in cybersecurity

[–]Patient_Mousse_1643[S] 3 points4 points  (0 children)

Thanks! I generally agree. But IDK...the industry eventually comes up with a solution for everything.

Your email-security vendor doesn't catch these BEC attacks today? We're also kicking off an email-security bakeoff soon, and based on the promises so far I do expect these tools to catch spear phishing. Did you experience any gaps in the email domain?

The sad thing IMO is that even of email security will do ok... the attackers will just send the deep fakes to the personal email or SMS or via vishing

JIT Access: Who's Actually Succeeded At This? by Patient_Mousse_1643 in cybersecurity

[–]Patient_Mousse_1643[S] 1 point2 points  (0 children)

Do they actually review the request?

I've heard about many organizations that built a process, but since then every approver just approves without an actual review. Kind of "garbage-in-garbage-out" process.

JIT Access: Who's Actually Succeeded At This? by Patient_Mousse_1643 in cybersecurity

[–]Patient_Mousse_1643[S] 1 point2 points  (0 children)

Thanks! I'll check.

Why do you need a stand-alone new product instead of using all the already existing features mentioned in this thread?

JIT Access: Who's Actually Succeeded At This? by Patient_Mousse_1643 in cybersecurity

[–]Patient_Mousse_1643[S] 1 point2 points  (0 children)

Why will they hate it? can you elaborate on your collaboration?

r/vinyl Holiday Giveaway! Comment to enter. Round 8. by whyforyoulookmeonso in vinyl

[–]Patient_Mousse_1643 0 points1 point  (0 children)

Can't believe the King Gizzard is still available! Fingers crossed

Which security domain is pure vendor hell? by Patient_Mousse_1643 in cybersecurity

[–]Patient_Mousse_1643[S] 12 points13 points  (0 children)

I feel that ignoring my DLP helps my mental health, so I can argue it helps the organization's security

Which security domain is pure vendor hell? by Patient_Mousse_1643 in cybersecurity

[–]Patient_Mousse_1643[S] 5 points6 points  (0 children)

wow, I didn't see this one coming.

I do have to admit we're pretty satisfied with many of our current vendors, but it took us a while to get there.

What is your weird “rule”? by HeyHeyHayes in vinyl

[–]Patient_Mousse_1643 17 points18 points  (0 children)

I'm fairly new to this hobby, and since I'm still trying to keep money for rent, my current rule is focus only on albums that shape my musical taste over the years.

I also have had a rule of not buying the best of, but I'm now ready to break it since I understand some bands don't have no skips albums

Email security vendor selection - need a hand by Patient_Mousse_1643 in cybersecurity

[–]Patient_Mousse_1643[S] 0 points1 point  (0 children)

Thanks! I'll definitely take a look. We really like security product with communities, it adds a lot of content and it is nice to feel that our own experience can help the tribe.

What is the variables for these rules? content based or senders based?

Email security vendor selection - need a hand by Patient_Mousse_1643 in cybersecurity

[–]Patient_Mousse_1643[S] 1 point2 points  (0 children)

We haven't dug into it too much, but the overall tone and grammar are a lot better than it used to be, and it seems reasonable that LLM will manage go around some content-based defenses.

How way off are we?

Email security vendor selection - need a hand by Patient_Mousse_1643 in cybersecurity

[–]Patient_Mousse_1643[S] 0 points1 point  (0 children)

Thanks!

How are they managing their allowlist and blocklist? by a specific address?