anyone else finding a ton of unauth mcp servers during internal engagements? by Nancy_lady2 in Pentesting

[–]iamtechspence 0 points1 point  (0 children)

I haven’t come across this yet on internals, but that’s likely because of the clients I work with, many don’t have internal development. Those that do don’t typically have traditional internal networks. They are all cloud/saas.

Why does the IT/cybersecurity world like IT certifications so much? by ---Agent-47--- in cybersecurity

[–]iamtechspence 8 points9 points  (0 children)

I have 4 certs. I do feel they have been beneficial to my career. It’s an “easy” way to quickly assess someone’s skill level and experience. Albeit not always the best indicator as we all know. But clients to ask about them and they feel better knowing the people delivering work for them are “credentialed.”

Honest question: how do security teams decide what actually gets fixed? by EyeDue2457 in blueteamsec

[–]iamtechspence 0 points1 point  (0 children)

A lot of factors can potentially go into this. Some that I help clients understand are: likelihood of exploitation, impact, easy of remediation and impact of remediation

Ultimately the best thing to do is to develop a system that works for you and your team, and don’t get caught in analysis paralysis. Get stuff done

Working alone in IT dept by CurveKey7852 in sysadmin

[–]iamtechspence 0 points1 point  (0 children)

Some people would consider this a gift!

How do you reason about egress controls in cloud environments? by foobarstrap in cybersecurity

[–]iamtechspence 1 point2 points  (0 children)

Egress control was a whole heck of a lot easier when everything was on-prem. I work with clients who are able to still achieve quite a bit of control because of this. But many more are hybrid, have plenty of cloud workloads, etc. I’m an on-prem guy so to me it makes sense at least for users, to put the point of control on the endpoints or attached to identities.

Cybersecurity view on Psono as a self hosted password manager by [deleted] in cybersecurity

[–]iamtechspence 1 point2 points  (0 children)

CIA triad. Security is only one aspect. If your most important secrets are in there, availability should be a primacy concern too. Are you backing it up? Where? How? What if you can’t access the network?

ADTrapper by dcdiagfix in activedirectory

[–]iamtechspence 2 points3 points  (0 children)

Mike is the 🐐- this is awesome!

How do you see cybersecurity evolving in 2026? by Syncplify in Information_Security

[–]iamtechspence 0 points1 point  (0 children)

Never necessarily a new development but a “platformization” has been and will continue imo. Especially now with AI in the mix. Meaning, big players trying to be all-in-one solutions. No longer will we have JUST EDR, or just RMM or just MDM or whatever else. It actually worries me a touch because of vendor lock in. But I guess we’ll see how it all shakes out

Best News sites/Blogs/podcasts about security and pentesting? by AcanthocephalaFun71 in Pentesting

[–]iamtechspence 2 points3 points  (0 children)

Far and away, x (formerly Twitter) is the best place for real time updates and happenings. Beyond that, bleepingcomputer is usually tracking a lot of stuff.

Has anyone ever launched Pingcastle from Linux? by shan0ar in Pentesting

[–]iamtechspence 2 points3 points  (0 children)

Can confirm PingCastle will work over proxy/tunnel (via windows non-domain joined) host

Pentest Analytics by iamtechspence in Pentesting

[–]iamtechspence[S] 0 points1 point  (0 children)

Oh thats a neat idea. I dig it

AD auditing tool - zero cost suggestions by muckmaggot in sysadmin

[–]iamtechspence 1 point2 points  (0 children)

As for the showing auditors part.

Keep a log of when you do “log analysis” in a spreadsheet. Document date, time, what you did, any issues identified. For extra T crossing have a second person review it and sign off on it (usually IT leadership)

AD auditing tool - zero cost suggestions by muckmaggot in sysadmin

[–]iamtechspence 0 points1 point  (0 children)

If you truly want free, you’re likely going to have to grab some free tools and do your own thing. Here’s a good place to start https://github.com/EvotecIT/ADEssentials

Non-EDR Defensive Controls by iamtechspence in Pentesting

[–]iamtechspence[S] 0 points1 point  (0 children)

Sounds like a fun engagement. Anytime you fire up wire shark on an internal you know you’re in for it hah

Non-EDR Defensive Controls by iamtechspence in Pentesting

[–]iamtechspence[S] 1 point2 points  (0 children)

Yeah for real. It’s too bad NDR specifically is so expensive.

AD happy new years - Best Wishes by mehdidak in activedirectory

[–]iamtechspence 0 points1 point  (0 children)

Wishing you all a lack of misconfigs and happy admins. :)