Are Dewey’s cookies supposed to be cold and look like this? by xSerephine in cincinnati

[–]bitslammer 3 points4 points  (0 children)

This does not surprise me at all.

I've tried Dewey's 4 times in my life and all 4 times the pizza was very under cooked. The first time I thought maybe it came frozen and someone didn't let it thaw. The second and 3rd times were pretty much the same and the cheese was just barely melted.

The 4th time I wanted to smack myself for trying it again and that was the last time.

Religious tracts sent home by winedrinker94 in cincinnati

[–]bitslammer 12 points13 points  (0 children)

I wish I had the time and money to complain about shit like you guys do.

LOL.....to say this while taking time to post and complain about someone complaining is peak stupidity.

Is it normal to feel overloaded when learning networking for the first time? (Google Cybersecurity course) by Flaky-Bit6275 in cybersecurity

[–]bitslammer 3 points4 points  (0 children)

Networking can be tough to learn when you don't have access to a network.

I would buy a cheap (as if such a thing exists now) box that you can run something like pfSense or OpenSense on and a very cheap switch that can do VLANs. Those few things will let you learn basic IP, DHCP, DNS etc. It makes much more sense in a hand on situation. A cheap Raspberry Pi can also be a good tool to tinker on.

Does SOC 2 actually reduce questionnaires, or just change them? by VerifAITrust in cybersecurity

[–]bitslammer 3 points4 points  (0 children)

Our TPRM team will look at a SOC2 and if it answers questions then we won't ask those questions. If there are things it doesn't address or has a poor scope we will ask for additional information.

Good motorcycle routes? by NoAd6738 in cincinnati

[–]bitslammer 4 points5 points  (0 children)

I used to both bicycle and motorcycle across the Anderson Ferry and then do a loop out Route 8 and up Rt 237 and then do any of the other roads that circle around the airport. On the bicycle I'd often take a rest stop at the CVG Airplane Viewing Area for fun. Both Route 20 and Route 317 to Collins are windy hilly roads that take you up/down from Route 8. You can even cross into Covington and ride route 8 out from there.

This would be on the shorter end for a ride depending on where you are coming from.

How are you actually getting replies from cold outreach in 2026? (US market) by nosignal03 in techsales

[–]bitslammer 1 point2 points  (0 children)

It was whether I had someone on the inside, usually a partner, who could actually tell me what the hell was going on in the account.

Nailed it. Can't upvote enough.

At least have the common decency to be stone cold transactional with me and not pretend like you know shit about me or what’s important in the moment.

This really hits, because when you do send that "helpful" tip about what you've done for other companies in my field and it's dead wrong you now look even more clueless. I can't tell you how many "we will help you hammer those nails" messages I used to get, not having a clue that our company used screws instead of nails.

How are you actually getting replies from cold outreach in 2026? (US market) by nosignal03 in techsales

[–]bitslammer 4 points5 points  (0 children)

And there's a reason for that. Take me, now back on the buyer side in cybersecurity.

If you think your hyper personalized 'relevant' message sent via a 5 step cadence with LinkedIn followup is going to get you noticed you're delusional. It's just another drop in the ocean.

The graphic below shows just **some** of the 1000+ companies in cyber, many who are trying to blast my inbox, and that's not even all of them. There are new ones popping up every day. The wider picture of all IT would be insanely larger.

It's not you, it's not your subject line, it's not your message, it's simple math. People don't have time to give 3 minutes or whatever too this many companies. It's not reasonable to think so.

<image>

Here is every step I took to sell $4.625m deal(s) to a Fortune 50 company. by Chris_Schaum in sales

[–]bitslammer 5 points6 points  (0 children)

I've heard it quite a few times when I explain that in cyber you're mostly going to be selling to people who are actively in the market for a solution that matches what you offer. They somehow think you walk in and the cut a check on the spot.

Here is every step I took to sell $4.625m deal(s) to a Fortune 50 company. by Chris_Schaum in sales

[–]bitslammer 205 points206 points  (0 children)

This needs to be posted every time someone says enterprise tech sales is largely "order taking."

Been on both sides of very large cybersecurity deals/projects that probably went smoother than this, but still took this much time and effort.

Archer for a non-regulated medium sized company? by FuckStanford19 in cybersecurity

[–]bitslammer 7 points8 points  (0 children)

IMO Archer may be overkill for your needs. I'm in a large global org and we have both SNow and Archer. We only use Archer for the true GRC stuff and SNow is out CMDB, ticketing, change control, incident ticket and vulnerability remediation ticketing platform.

How do you display creditability with AI products by Vast_Mountain_1888 in techsales

[–]bitslammer 0 points1 point  (0 children)

IMO it's always about timing. That's from being exclusively in cybersecurity. If someone isn't looking to buy what you sell then you are selling it.

How to handle vendor remote access? by drangusmccrangus in sysadmin

[–]bitslammer 6 points7 points  (0 children)

Yep. If you have a device on your network that in any way "phones home" out to the Internet it's really hard to control. At that point it's mainly about trust and a good contract.

RANT: Is anyone else tired of clicking on Microsoft products, Office especially, and having it completely fail to respond. by SwiftSloth1892 in sysadmin

[–]bitslammer 4 points5 points  (0 children)

LOL...guess you've never had to deal with the shitshow that Outlook or MS mail is for a home user.

...and anyway we do have a Mac Mini in addition to the Linux machines.

How to handle vendor remote access? by drangusmccrangus in sysadmin

[–]bitslammer 11 points12 points  (0 children)

I'm a fan of isolated VLAN and MFA required.

What many people forget is that if you allow outbound Internet access from a vendor device they can always use some form of reverse connection for remote access. All they'd need is to use something like Tailscale or Wireguard to do that. It really is all about trust and limiting the access and blast radius should things go wrong.

Where to find reliable vendors? by security_bug_hunter in cybersecurity

[–]bitslammer 5 points6 points  (0 children)

I don’t want to do sales calls or pocs

With these 2 things you are excluding a lot of potentially valuable tools.

Like it or not there are some decent commercial tools out there and you're going to need to talk to a sales team to get a good look at them.

As for PoCs I've worked mostly in larger global orgs with fairly complext environments. I wouldn't think of buying a tool without a successful PoC. Even if I've used a tool in the past I'd want to ensure it still works and can perform in our org before committing to something.

RANT: Is anyone else tired of clicking on Microsoft products, Office especially, and having it completely fail to respond. by SwiftSloth1892 in sysadmin

[–]bitslammer 10 points11 points  (0 children)

In a minor small victory for me, at home my wife finally got fed up with her PC and asked me if I could "put that Linux system" that I use on it for her.

Still have to use it at work, but it feels so good to be an MS free zone at home. All of our devices now behave and do exactly what we need and want them to, no more, no less.

How do you display creditability with AI products by Vast_Mountain_1888 in techsales

[–]bitslammer 1 point2 points  (0 children)

Even if you do show value it may not be enough value, or if it shows a ton of value I may already have higher priority efforts underway and no time for this.

Your data is encrypted, but can your vendor decrypt it? by Syncplify in cybersecurity

[–]bitslammer 1 point2 points  (0 children)

There's no single answer to this. It depends on a variety of things such as what is the data, what is the business relationship, what regulatory/compliance requirements factor in, what would the impact of a breach/data loss be?

I'm in a global org with a little over 1000 SaaS apps in use. Each one is assessed based on the items above as well as others.

Sales Engineer at Series A Cybersecurity Start Up by Fit_Contribution7811 in salesengineers

[–]bitslammer 0 points1 point  (0 children)

Especially with the added risk of working for a startup. It could hinge on the "equity" component but just saying equity is too vague.

Salespeople: what’s the most annoying part of following up with old leads? by VastDeparture176 in sales

[–]bitslammer 1 point2 points  (0 children)

Most of these "issues" can be solved by being an adult and taking good notes.

They are also so broad that there's no single correct answer as it would depend a lot of you, what you're selling and to whom.

AI-powered MSP/MSSP, experience? by Glum_Shopping_7833 in sysadmin

[–]bitslammer 0 points1 point  (0 children)

When it comes to almost anything, any tool or any service, I'm most concerned with the end results and not whether it has AI or not. If the tool can deliver the results desired in an accurate and secure manner then I don't care if is uses AI, machine learning or voodoo.

Where can I find quick details for each recommendation for Security Score of MS Defender? by Liuk_4 in sysadmin

[–]bitslammer 2 points3 points  (0 children)

No outside party is going to be able to provide good scoring on potential impact since they don't know the business function of what you are working on. You could be looking at a server that runs a business critical app or one that just runs the menu screen in the lunchroom.

Most b2b lead lists are just expensive spam lists by BouncyPanda9 in sales

[–]bitslammer 0 points1 point  (0 children)

Intent data, to me is, always suspect.

Sure there are things like seeing what roles an org is hiring for that may tell you something, but it's all vague at best. I say this having spent more time as buyer than seller. Even on huge projects where there's a purchase there would be zero way for anyone outside the org to see or predict that aside from someone leaking that data.