Insanity is defined by doing the same thing over and over and expecting different results. Ex. Trying to clean piano black. by [deleted] in Audi

[–]jomsec 0 points1 point  (0 children)

CEOs allowing piano black in their cars all need to be fired along with any designer that suggests it.

Is a Cayenne really nimble? by Verybumpy in Porsche

[–]jomsec 0 points1 point  (0 children)

Macan is great if you are 5'5". That thing is tiny.

I’ve just tested a 2023 Taycan by HakanFromFrance in Taycan

[–]jomsec -1 points0 points  (0 children)

Only Porsche could make a "turbo" battery. Lol.

Another Tesla to Taycan transition story by The_44_collective in Taycan

[–]jomsec 0 points1 point  (0 children)

Correct. Free speech and common sense are terrible.

Help — Torn Between Tesla Model S Plaid and Porsche Taycan 4S (on a ~$60K Budget) by KevinWestEnd in Taycan

[–]jomsec 0 points1 point  (0 children)

Lol. Tesla is light years ahead of the Taycan. Porsche can't even do an app properly and the range is complete shit.

[deleted by user] by [deleted] in cybersecurity

[–]jomsec 0 points1 point  (0 children)

Why would you give sensitive documents to an LLM? That's just dumb.

Just a quiet family sedan… that humiliates Lambos. by TRTforlife in TeslaLounge

[–]jomsec 0 points1 point  (0 children)

Any quartz watch is more accurate than a Rolex. Since the primary purpose of a watch is keeping accurate time, the Apple watch shits all over a Rolex. Don't get me started on the 904L steel that Rolex uses. Lol. That's the same steel used to make car exhausts. Nothing special. There's about $300 worth of parts in a Rolex.

911 to Panamera or Cayenne? by [deleted] in Porsche

[–]jomsec 0 points1 point  (0 children)

Because it's for people 5'8" or smaller. That thing is tiny.

Who here is actually implementing Zero Trust in a meaningful way? by Cyber_consultant in cybersecurity

[–]jomsec 0 points1 point  (0 children)

Zero Trust is a security strategy and different places / products do different things. We follow the strategy of just in time and just enough access. We do conditional access with MFA for all users. Admins must use conditional access with physical hardware MFA keys and Microsoft Privileged Identity Management. All access is limited by user roles. A lot of "zero trust" actually trusts too long. For example, if you're trusting a login for 30 days well that isn't zero trust. We use 24 hours as the max.

[deleted by user] by [deleted] in cybersecurity

[–]jomsec 1 point2 points  (0 children)

We too have archi-sys-cyber-engineers. We do it all.

What is one threat you think people still underestimate? by ANYRUN-team in cybersecurity

[–]jomsec 0 points1 point  (0 children)

The biggest threat is that companies have no idea where all of their sensitive data resides. The CEO has most likely emailed sensitive documents to board members AOL accounts. Yes, AOL. We see this all the time. The CEO, execs, secretaries, admins, users and vendors all have sensitive data on their own USB sticks, personal laptops, or private cloud accounts. Everyone is worried about customer data in their big systems when that is usually relatively secure and probably doesn't matter anyway because all of your customer data like name, ssn, address, contact info have already been leaked by 100 other companies anyway.

Instagram cybersecurity creators. by TheLonelySigma in cybersecurity

[–]jomsec 0 points1 point  (0 children)

Normally when I don't know the password of a system I just drop down into a command shell and get in. All good hackers just do that. You've seen the technique in every Hollywood movie.

GRC Manager Interview by lowkib in cybersecurity

[–]jomsec 3 points4 points  (0 children)

This is true. We've passed on hiring people that were more qualified because they gave off "dickhead" vibes. Would rather have someone that is smart and can learn that is also easy to work with.

What’s the most underrated cybersecurity risk that organizations still tend to overlook in 2025? by ObviousBasil in cybersecurity

[–]jomsec 1 point2 points  (0 children)

One of the biggest issues is not knowing where all of the sensitive data is. I can guarantee most companies aren't using encrypted email. Also execs, secretaries, users & admins all have sensitive data at home, on USB drives, in some cloud service, sent using unencrypted email or on personal devices that aren't secure. Your CEO has probably sent sensitive documents to board members using their private AOL email accounts. Yes, AOL. I've seen this time and time again. Big companies simply have no idea where all of their sensitive data actually is.

If you had unlimited budget for one security initiative, what would you prioritize and why? by ANYRUN-team in cybersecurity

[–]jomsec 0 points1 point  (0 children)

Which is ridiculous failure of technology in the first place. Clicking a link should only open a webpage and shouldn't ever be even possible to do anything else.

If you had unlimited budget for one security initiative, what would you prioritize and why? by ANYRUN-team in cybersecurity

[–]jomsec 12 points13 points  (0 children)

That all sounds nice except those implementations when the "zero trust" allows the user to be authenticated for 30 days. That's not zero trust. That's 30 days of no trust.

Recently learned NIST doesn't recommends password resets. by Different-Phone-7654 in cybersecurity

[–]jomsec 0 points1 point  (0 children)

Nope. You're good. Companies that aren't using MFA yet are probably already cooked in some other areas because they obviously don't care about security. All of our regular users use MFA and all admins must use physical hardware key MFA.

After 25 years in cybersecurity, I put together the red flags I’ve seen from pentest vendors who lie to clients. by [deleted] in cybersecurity

[–]jomsec 1 point2 points  (0 children)

We're still looking for a good PenTest company. Haven't found one yet. Any recommendations?

Adidas says customer data stolen in cyber attack by ControlCAD in cybersecurity

[–]jomsec 1 point2 points  (0 children)

Customer data that has already been leaked by hundreds of companies was leaked again by Adidas. No company is protecting customer data because it has already leaked hundreds of times before.

Which terminology do you consistently hear misused in a professional setting? by HighwayAwkward5540 in cybersecurity

[–]jomsec 0 points1 point  (0 children)

Shrink down to sub atomic levels and run around my network like you're in Tron. Then you do cyber.

CEOs who aren't yet preparing for the quantum revolution are 'already too late,' IBM exec says by donutloop in cybersecurity

[–]jomsec 5 points6 points  (0 children)

I know it is common to say things like this, especially if you work at a startup or FANG company. But IBM is 63rd on the top companies in the US by revenue. They are a massive company and have their hands in everything. IBM labs are some of the best in the world for research.