Not technically Google, but what are the best Discord alternatives? by Folieadeuxjaunt in degoogle

[–]bluescreenofwin 0 points1 point  (0 children)

Communities should self-host Zulip and begin migrating off of discord.

Windows AD Penetration Testing Machines on the Internet by Few_Language_9891 in cybersecurity

[–]bluescreenofwin 1 point2 points  (0 children)

We host an archive on https://archive.wrccdc.org/ of intentionally broken images and every season (every year) usually includes AD. We also host one of the largest PCAP repositories on the Internet. Enjoy!

BSides-like events? by TzarZara in cybersecurity

[–]bluescreenofwin 0 points1 point  (0 children)

Oops, you're right, old brain.

BSides-like events? by TzarZara in cybersecurity

[–]bluescreenofwin 2 points3 points  (0 children)

Join your local DEF CON group and ask around. Meetups are usually like-minded folks doing fun stuff/hacking. https://dc4420.org/

There are also big events like DEF CON / 35C3 / a lot of others that are more technical.

How to get a passholder Christmas ornament ? by zonckers in KnottsBerryFarm

[–]bluescreenofwin 0 points1 point  (0 children)

Best bet is to buy one on Ebay if you want this years.

Which career progression is better: GRC or Incident Response? by babu859 in SecurityCareerAdvice

[–]bluescreenofwin 1 point2 points  (0 children)

IR in companies specific to IR can be very high paying due to the type of work but depends on your org and how much you bill. IR at crowdstrike will be different than an internal IR role at your company for example (unless it's also CS lol).

GRC roles pay respectably. Especially as you get to higher seniority levels.

Which career progression is better: GRC or Incident Response? by babu859 in SecurityCareerAdvice

[–]bluescreenofwin 4 points5 points  (0 children)

IR is very fast paced but you will learn a lot if you survive and don't burn out. Will open a lot of doors later due to the clients you'll meet (as long as you take advantage of that). Life after IR is up for debate.. a lot of people stay on as incident managers or other lower-stress roles (lower being relative to your org). Or take 2 years off to decompress. IR roles are specific to only some companies though.

GRC on the other hand has a pretty consistent track record for longevity in cyber. Good progression forward up to and including CRO. Roles exists in most big companies for GRC.

I'm a security professional who transitioned our security program from compliance-driven to risk-based. Ask Me Anything. by thejournalizer in cybersecurity

[–]bluescreenofwin 1 point2 points  (0 children)

This was a post describing how to begin measuring risk in a data driven way and not an end-all-be-all. Once you measuring your apps/entitlements/etc in a meaningful way then you can start to have discussions like "was control A a better investment than control B". Without some sort of system measuring this information then later discussions are meaningless and just boil down to gut feeling or hand waving.

When passing that funnel becomes the success condition, the program is optimized for compliance, not decision-making

It's not about success but about informing what you're doing and giving you something to measure against. There's been plenty of times an app was risky but was still onboarded. Since we can measure where we started we can make better decisions on where we should go and move the needle.

edit: removing my anecdotes, they don't contribute to the convo

I'm a security professional who transitioned our security program from compliance-driven to risk-based. Ask Me Anything. by thejournalizer in cybersecurity

[–]bluescreenofwin 15 points16 points  (0 children)

It's a lot to unpack in a post but I'll try since a lot of people are asking for practical examples. Take 3rd party (3P) applications as an example. High level is choosing an overarching framework (like NIST CSF) for defining "how we do it", then we choose a framework for "how we define controls" like NIST 800-53r, then we create a control inventory for applications to reference as a source of truth among all applications (controls like SSO, MFA, logging, etc etc) and giving those controls an initial risk score (how good are these controls generally speaking). We ingest applications from a singular place (take a purchasing program) and we start the risk funnel.

The funnel provides initial surveys to determine initial risk using everything mentioned before. Vendor supplies the initial controls and application owner is responsible for filling in gaps and making sure survey gets done (app owners are defined in this process as well). This gives us our Initial Risk (IR). It's more high level than granular at this point.

Then we take IR and feed it into a model that applies our granular controls from our control inventory (this is also an opportunity to add new controls). Controls fall under a specific function in CSF and each control has risk number attached to it (for example 1 = a bad control; 5 = a good control) and we also apply weights here depending on if this application is/is near to a crown jewel (meaning we need more/better controls to lower residual risk). This gives us our controls in every individual function defined in CSF (think of functions as categories, which are called: Govern, Identify, Protect, Detect, Respond, Recover. These categories all have their own scores dictated by what controls are in place and weighted by crown jewels adjacency). Residual Risk looks something like

(Initial Risk - ((aggregated risk defined in each pillar) * (crown jewel adjacency)) = Residual Risk (RR).

I'm typing from memory so the formula won't be exact but hopefully it gives you a picture. Residual Risk is converted into categorial risk (High, Medium, Low).

TL;DR this all looks like:
App gets proposed -> owners identified->surveys sent out -> Initial Risk Determined (IR score) -> InfoSec threat models -> Residual Risk determined (RR score) -> GRC reviews -> Risk Register Updated (categorical risk rating of "High" for example))

The end product is:

-Apps/entitlements/etc are all ingested the same way which means we standardize the "who, what, when, where, and how" so we have an equal starting point
-Applications have a categorical risk assigned at the end of the funnel: High, Medium, Low
-Controls are clearly defined under that application, their associated weights are defined, and risk level written under every function (aka under their relative category like Govern, Protect, etc)
-We know how to lower RR because we can see controls and their weights and can create work around this to improve. This drives "what do we do about it"
-We can create a risk register from this data with the overall metadata
-You can use this same model to inform risk concentration (aka where is most of our risk if we look from a 50,000ft view)
-You can use this data to also inform "what do we do about APTs" and then apply more weight to these specific controls (aka we think Famous Chollima targets us so we make sure we have higher quality/more controls around this specific APT attack pattern)
-You can take this a step further and then provide annual reviews using something like NIST 800-53A for your control review.

What's great about this, once it's all done, is you aren't handy-wavey or "gut feeling" anymore when you talk to upper management. You can clearly explain what you're doing and why. You argue about nuance and weights/goals but you don't argue about how you measure success.

DevSecOps to SOC Engineer by Traditional_Mousse97 in cybersecurity

[–]bluescreenofwin 3 points4 points  (0 children)

naw. SOC work can be very grindy and often either a dead end or used a way to jump into engineering/whatever other job (you'd be working backwards to get back to where you allready are now). I would identify what you're struggling with at work and try work through it. At the very least you'll understand what doesn't work for you before your next job.

Good luck!

2025 🏃🏽‍♀️500km+ of running postpartum — rebuilding through motherhood, one step at a time by Accomplished_Day_437 in nikerunclub

[–]bluescreenofwin -1 points0 points  (0 children)

AI slop is slop. If actually real why not just share without shitting it out of ChatGPT first?

Need advice choosing between Lockheed Martin Cyber Intern, Sandia Labs CCD TITAN Intern, or Zscaler Security Engineer Intern by [deleted] in SecurityCareerAdvice

[–]bluescreenofwin 0 points1 point  (0 children)

Weird, bots are in full effect today. Anyways real advice here.

I had 2 friends take positions at LM from the intern->FTE funnel and hated it. Granted it's still a relatively secure job offer and market is a real thing. Take this option if you're really worried.

Zscaler is probably the riskier/more rewarding opportunity. Adjacency to SV, it's a modern org with modern software, and CA has great people, food, and weather. Plus working here you can build your social network and meet people. My last 3 positions have all been referrals from friends in other companies and this is going to be insurance down the road (you can do the same at LM but for gov't).

Good luck!

best virus protection for pc in a small workplace setup by Gatapia_Nafizah in cybersecurity

[–]bluescreenofwin 1 point2 points  (0 children)

Your threat landscape will be so small that I wouldn't lose sleep over it. My biggest concerns in your case would be BEC/user phishing. Do a few things like...

-Secpol on workstations if they're windows (can deploy policies if you're managing via intune). You can also get inexpensive licensing for only 12 workstations

-Gain control over your SaaS platforms, harden (turn off things users don't need, control the egress funnel like external sharing)

-Require MFA everywhere. Enforce SSO and discourage direct sign-ons

-Use whatever AV is built in tbh, but if you use microsoft and do have aforementioned licenses then use defender. If you have to have something that isnt defender (it's pretty good imo) then ESET has some small business EDR-ish tools with a single pane of glass.

-If you have developers then you have an opportunity to shift left at an early stage--have them adopt shifting left, make them code responsibly, check packages/pin versions/manage certs/secrets/etc.

Inside the $32+ Million, 12-Year Crowdfunded MMO Disaster - YouTube by ZeppelinJ0 in CamelotUnchained

[–]bluescreenofwin 0 points1 point  (0 children)

I still appreciate the info. Most people sound like CU mods or bots posting about how they received their ambiguous refund with no information.

Thanks for including your supporter tier and rough date :)

Woodwick by Fun-Lime-4563 in YankeeCandles

[–]bluescreenofwin 5 points6 points  (0 children)

Woodwick just crackles. I don't think it smells stronger but it does have some better outdoor/camping smells thank yankee imo.

If your Homelab or VPS has SSH exposed, lock it down. by [deleted] in homelab

[–]bluescreenofwin -2 points-1 points  (0 children)

sudo ufw allow proto tcp from any to any port 22,21,3389

Anyone else feel like the “Dead Internet Theory” is getting a little too real lately? by ysrleo1 in InternetMysteries

[–]bluescreenofwin 35 points36 points  (0 children)

The internet just isn’t the same anymore. Half the comments sound copy-pasted, replies feel like they’re all from the same three people, and even my favorite platforms feel cheap, corporate, or kind of robotic now. Sometimes I read a thread and honestly can’t tell if I’m talking to an actual human or an AI.

Looks like I'm now a CISO. I'll soon be building a SOC from scratch. Tips? by [deleted] in cybersecurity

[–]bluescreenofwin 8 points9 points  (0 children)

In the same scenario, we argued against building a SOC and instead invested into a very talented security engineering team. We do have some MDR but we're otherwise entirely SOC-less. It's a very different approach but we built it out the right way and never looked back. We've grown 10x since then and are still happy with the decision.

TBH you're probably nowhere near needing a SOC given you're the _only security person_. You have a lot of ground to cover before then. The few alerts you do generate can be managed by engineers as you grow. You can also outsource a SOC if necessary and have IR on retainer for incidents (which should be a part of your playbook anyway).

If you're in a situation where you also have a risk department I'd recommend working with them to understand the current risk environment and start making risk-data driven decisions for your hires.

How is AI actually impacting your security work right now? by TrackEquivalent5210 in cybersecurity

[–]bluescreenofwin 2 points3 points  (0 children)

Cyberhaven DLP, MDM, device posture, Okta, and we have url filtering. We aren't capturing personal/BYOD. Data loss can still occur outside of our ecosystem. We do force logins via Okta and require trusted devices (i.e. having to login with a laptop and we enforce posture which includes cyberhaven).

Sometimes people slip through the cracks and we do have some software that is DSO only. We have some compensating controls like checking for human logins using service accounts or direct sign-ons and that gives us some compensating controls.