CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Proxy vs VPN

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

CyberSecurity - What are some things that get a bad rap, but are actually quite secure?

CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Cybersecurity is an important issue for everyone, from individuals to large organizations. There are many things that get a bad rap when it comes to cybersecurity, but that doesn’t mean they’re not secure. For example, PGP (Pretty Good Privacy) is a method of encrypting emails that is considered to be very secure. However, it can be difficult to set up and use. Another example is using very long passwords that are actually a sentence. This may seem like a security risk, but it’s actually more secure than a shorter password because it’s more difficult for hackers to guess. Additionally, changing the default port for certain services like databases can help to prevent hacking. Unplugging the ethernet cable may also seem like a security risk, but it’s actually one of the most effective ways to prevent data breaches. Finally, browser password managers are often considered to be insecure, but they’re actually quite secure if used properly. Cybersecurity is an important issue, and there are many things that can be done to help prevent hacking and data breaches.

There are a lot of CyberSecurity myths out there. People think that X, Y, and Z are the most secure way to do things when in reality, they are the least secure. The biggest myth is that PGP is unbreakable. PGP has been broken many times and is not a reliable form of CyberSecurity. Another myth is that very long passwords are secure. The problem with very long passwords is that they are difficult to remember and often get written down somewhere. If a hacker gets ahold of your password, they can easily access your account. The best way to prevent CyberSecurity breaches is to use MFA, OAuth, and two-step verification whenever possible. These methods make it much more difficult for hackers to gain access to your accounts. While they may not be foolproof, they are the best CyberSecurity measure available.

1- PGP

PGP is a Form of Minimalism

As a protocol, PGP is surprising simple. Here is what happens if you want to use it to securely send a message to someone:

  1. You get from them a PGP identity (public key). How you do that is entirely up to you.
  2. Your PGP program uses that identity to perform a single public key encryption of a message key.
  3. Then the message key is used to encrypt the message which is added to the encrypted message key to make the encrypted message.
  4. Your correspondent does the opposite operations to get the message.

If you want to sign your message then you:

  1. Hash the message.
  2. Do a public key signature operation on the hash and attach the result to the message.
  3. Your correspondent checks the signature from your PGP identity, which they have acquired somehow.

The simple key handling is where the minimalism comes from. It is why PGP can be used in so many non-email contexts.

As a contrast, consider the Signal Protocol for instant messaging. I will not attempt to describe Signal in any detail as I would get parts of it wrong. It would also make for a pointlessly long article. There is a high level description of the Signal protocol here. None of the following comments are intended to be critical, they are intended to give an idea of the level of complexity of the protocol in total:

  • Signal has at least 2 systems for creating forward secrecy. Each system requires a system to deal with loss of synchronization.
  • A Signal session requires the storage and maintenance of a lot of state information.
  • Signal normally uses a server based “prekey” system to deal with the case where a client is offline and thus is unable to negotiate.
  • Signal achieves partial deniability with a triple Diffie-Hellman key exchange. OpenPGP achieves complete deniability by not signing the message in the first place.
  • Supporting the Signal protocol in practice requires a separate system to store and protect past messages1). Since this is at odds with forward secrecy such a system will end up with a system to delete old messages.

The Signal Protocol is built on ideas from the Off the Record (OTR) protocol. Interestingly enough, OTR was intended to improve PGP by adding extra functionality. Signal adds functionality on top of the OTR functionality. So Signal could be considered the result of an attempt to improve something by making it more complex.

Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet)  Business Plan (AMERICAS) with  the following codes:  C37HCAQRVR7JTFK Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)

Active Anti-Aging Eye Gel, Reduces Dark Circles, Puffy Eyes, Crow's Feet and Fine Lines & Wrinkles, Packed with Hyaluronic Acid & Age Defying Botanicals

I believe that reliability and security are best achieved with simple systems. OpenPGP is a standard that describes such a system.

2- Very long passwords that are actually a sentence

It could be bad if you just came up with it and forget it, and people think it’s bad if it only has lowercase and no numbers or punctuation. But a 5-6 word sentence could be quite secure, especially if it’s a bit weird. “Lemons make a delicious snack in my house.”

3- Writing passwords down.

I tell all my old relatives to write their passwords down in a little notebook. As long as there isn’t someone there regularly I don’t trust, it is much better than using same password and if their physical security at their house is compromised, there are bigger concerns than a notebook of banking passwords.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Bard, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

We write down all the passwords to our most secure systems – but then we rip them in half and put them in 2 separate safes.

Did I say passwords? I meant encryption keys.

4- Changing default ports for certain services like dbs

Most of the gangs out there use tools that don’t do a full search, so they go through the default port list

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

5- MFA in general.

Takes 60 seconds to set up, and an additional 5s each time you use it, but can save you hours if not days of manual recovery efforts with support to regain access to a compromised account. Yet people don’t like the idea.

If you are using TOTP for your MFA, you can even put it right in the browser with a plug-in. I use this approach for work. It’s very convenient.

If you use a password manager that supports TOTP and auto type (e.g. KeePassXC) then you don’t even need to mess with it once you have it set up.

6- Oauth for 3rd party apps.

Those “sign into our app with your (Google, Microsoft, etc) account” things. As long as you trust the ID provider and the app, it’s usually secure. More so, considering it prevents password reuse, and you aren’t exposed if any of those 3rd party apps have a breach.

7- Two-step verification.

Yes it’s annoying to need two devices every time you want to log into your most precious accounts, but trust me, I’d rather take the extra 10 seconds to authorize a login than go through the hell of having my account breached.

8-Biometric Authentication.

The argument is that ‘you can’t change your face/finger’ but it is actually more secure than other ‘magic link’ providers.

Let me be clear, there are some providers that are still iffy on security. But there are also some that have device native authentication (you need the device to auth), they don’t store passwords or password hashes, and only has public keys.

One example of this is https://passage.id/ which is about as secure as you can get.

9- Zoom.

Yes, they had a bunch of issues at the start, but they fixed them. I would much rather work with a company that had security assessments and fixed the problems rather than a company which has never been assessed.

10- Unplugging the ethernet cable.

11- Browser password managers?

Rant moment: reasons cybersecurity fails

<Rant>

Djamgatech: Build the skills that’ll drive your career into six figures: Get Djamgatech.

People don’t see value of putting effort in cybersecurity because they don’t see any material gains from it. The best thing they can see is nothing bad happening.

No news isn’t good enough of a good news. This is enough to mostly ignore all cybersecurity advice altogether.

This is similar to people not taking care of themselves health-wise, because the best things they can see is not getting sick.

</Rant>

Why do cyber attackers commonly use social engineering attacks?

Hackers commonly use social engineering attacks because they can be very effective. By using social engineering, hackers can take advantage of people’s trusting nature and willingness to help others. They can also exploit the fact that people are often not well-informed about security and privacy issues. For example, a hacker might pose as a customer service representative and ask for someone’s password. Or, they might send an email that looks like it is from a trusted source, such as a bank or government agency, and ask the recipient to click on a link or download an attachment. If the person falls for the deception, the hacker can gain access to their accounts or infect their computer with malware. That is why it is important to be aware of these types of attacks and know how to protect yourself.

Cyber attackers commonly use social engineering attacks for a number of reasons. First, hacking into a person’s or organization’s computer systems is becoming increasingly difficult as security measures become more sophisticated. Second, even if a hacker is able to gain access to a system, they are likely to be discovered and caught before they can do any significant damage. Third, social engineering attacks allow hackers to bypass security measures and obtain sensitive information without being detected. Finally, social media platforms have made it easier for cyber attackers to obtain personal information about their targets and to carry out attacks. As a result, social engineering attacks are an attractive option for many cyber attackers.

To conclude:

Cybersecurity is often thought of as a complex and technical field, but there are actually many simple things that everyone can do to help stay safe online. For example, one way to protect your online communications is to use PGP encryption. This type of encryption is incredibly difficult for even the most skilled hacker to break, but it’s also easy to use. Another way to improve your cybersecurity is to use very long passwords that are actually a sentence. This may seem daunting, but using a phrase as your password makes it much harder for hackers to guess. Additionally, changing the default ports for certain services can help prevent unauthorized access. And finally, unplugging the ethernet cable when you’re not using it is a great way to physically block hackers from accessing your device. By following these simple tips, you can dramatically improve your cybersecurity and protect your privacy.

source: r/cybersecurity

Source: r/cybersecurity

  • predictive algorithms
    by /u/Thin-Parfait4539 (cybersecurity) on April 24, 2024 at 7:51 pm

    I'm interested in leveraging advanced analytics, particularly predictive algorithms, to get ahead of potential vulnerabilities and attacks. Our team is facing a similar situation and is eager to learn more from others' experiences. Specifically, I'd like to understand: Do your peers use advanced analytics, especially predictive algorithms, to forecast vulnerability and attack trends? If so, what kind of data sources are they using (e.g., historical data, risk reports, threat intelligence)? What types of algorithms have proven most effective in this area (e.g., robust regression, neural networks)? We're open to collaborating or sharing best practices to improve our organization's security posture. I believe advanced analytics can be a powerful tool for proactive cybersecurity, and I'm keen to explore its potential further. submitted by /u/Thin-Parfait4539 [link] [comments]

  • Symbiote Guide
    by Yunus Emre Gürlek (Cybersecurity on Medium) on April 24, 2024 at 7:27 pm

    What is Symbiote and setup in systemContinue reading on Medium »

  • JA4T: TCP Fingerprinting - And How to Use It to Block Over 60% of Internet Scan Traffic
    by /u/QforQ (cybersecurity) on April 24, 2024 at 7:22 pm

    submitted by /u/QforQ [link] [comments]

  • Rewarding employees who report observations related to cybersecurity threats
    by /u/meanmothafugga (cybersecurity) on April 24, 2024 at 7:18 pm

    What's up y'all. I work on a data engineering team at a large aerospace manufacturer that has some very valuable IP and is under constant attack. We all get weekly social engineering attacks in the form of fake texts from our CEO, fake emails from our bosses, etc. With my day crammed with meetings and my focus not on our cybersecurity vulnerabilities, I feel that myself and others are not properly incentivized to take these daily threats seriously. I suggested to a security engineer in the company that we set up an incentive program to reward employees who find and report attacks and vulnerabilities they see that way people start paying more attention and we have a more proactive cybersecurity awareness program. My suggestion wasn't flat out rejected but wasn't taken seriously. I'm curious if other organizations have attempted something similar. It feels like security and detection engineering has become so sophisticated but then a simple social engineering attack flies right in the face of that sophistication. submitted by /u/meanmothafugga [link] [comments]

  • The Best Way to Love Someone is Not Through Frequent Contact, But by Giving Her These “Things”
    by Gany Wegner (Security on Medium) on April 24, 2024 at 7:17 pm

    Show Love Through Actions, Not Just WordsContinue reading on Medium »

  • SSE vs AV for an SME
    by /u/Fantastic_Set8169 (cybersecurity) on April 24, 2024 at 7:16 pm

    Is SSE the new thing, does it replace an AV? For context I am doing a project for a small business of 4 employees who mainly use documents, emails and have around 1TB of data. ( they also work remotely for around 5 months a year) Would you reccomend looking for an SSE solution or just stick with an antivirus Budget is not an issue submitted by /u/Fantastic_Set8169 [link] [comments]

  • The Power of Quantum Algorithms and Error Correction
    by Pixel Precision Engineering (Cybersecurity on Medium) on April 24, 2024 at 7:09 pm

    Understanding the Mathematical Foundations of Quantum ComputersContinue reading on Medium »

  • Reverse engineering IoT/Mobile — e-scooters use case
    by Ilies T (Cybersecurity on Medium) on April 24, 2024 at 7:04 pm

    This article explores the step-by-step process of reverse engineering an e-scooter application.Continue reading on Medium »

  • GCIH (GIAC Certified Incident Handler) Experience
    by rewscel (Cybersecurity on Medium) on April 24, 2024 at 7:02 pm

    What is the GCIH certification?Continue reading on Medium »

  • 2x Actively Exploited Cisco CVEs in Adaptive Security Compliance (ASA) & Firepower Threat Defense (FTD)
    by /u/blackpoint_APG (cybersecurity) on April 24, 2024 at 6:56 pm

    (That would be Adaptive Security Appliance*,* of course...) What's Going On? This afternoon, Cisco released 2 new CVEs impacting their Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD), both of which are actively exploited by UAT4356. More on CVE-2024-20353 Vendor CVSS Score 8.6 Allows an unauthenticated, remote attacker to force a compromised device to reload unexpectedly, resulting in a denial of service (DoS) condition. More on CVE-2024-20359 Vendor CVSS Score 6.0 Allows an unauthenticated, local attacker to execute arbitrary code with root-level privileges. (Note: Administrator privileges are required to exploit this vulnerability.) Potential Risk? The APG and Cisco have confirmed that these two vulnerabilities are currently actively exploited in the wild! Specifically, Cisco's Talos Intelligence reported an ongoing campaign ("ArcaneDoor"), in which threat actors from UAT4356 deployed two backdoors (“Line Runner” and “Line Dancer”). These threat actors conducted multiple malicious activities, including: Configuration modification, Reconnaissance, Network traffic capture and exfiltration, and Potential lateral movement. How to Mitigate Today, Cisco recommends: Applying software updates with patches for the impacted Cisco ASA and FTD software. Using their provided Cisco Software Checker to help users identify vulnerability exposure to these and other CVEs. Note: Cisco has not identified other workarounds for either CVE-2024-20353 or CVE-2024-20359! For more information ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability submitted by /u/blackpoint_APG [link] [comments]

  • Writing Code With Security in Mind
    by Aminu Barade (Cybersecurity on Medium) on April 24, 2024 at 6:54 pm

    The world we live in now is created by software Engineers, I’m not talking about the metaverse but cyberspace where all our digital…Continue reading on Medium »

  • What would happen if all the cybersecurity specialists disappeared?
    by romanpnn (Cybersecurity on Medium) on April 24, 2024 at 6:51 pm

    Hi there! I’m Roman Panin, the head of the Security Architecture at Mobile TeleSystems (public company, the largest mobile network…Continue reading on Medium »

  • Cybersecurity Best Practices For Your Business
    by Techvention (Security on Medium) on April 24, 2024 at 6:36 pm

    Strengthen your business against cyber threats. Conduct audits, update policies, collaborate with IT, control access, monitor users etc.Continue reading on Medium »

  • Cybersecurity Best Practices For Your Business
    by Techvention (Cybersecurity on Medium) on April 24, 2024 at 6:36 pm

    Strengthen your business against cyber threats. Conduct audits, update policies, collaborate with IT, control access, monitor users etc.Continue reading on Medium »

  • Emergency Response: How Security Guards Handle Crisis Situations in London
    by 1st Shield Security Services UK (Security on Medium) on April 24, 2024 at 6:28 pm

    In the bustling metropolis of London, where life moves at a rapid pace, ensuring safety and security is paramount. Amidst the vibrant…Continue reading on Medium »

  • Complexities of Privacy and Security in Digital World
    by ZA Writes (Security on Medium) on April 24, 2024 at 6:19 pm

    Photo by FlyD on UnsplashContinue reading on Medium »

  • JSON Web Token (JWT): A Comprehensive Guide
    by Igor Venturelli (Cybersecurity on Medium) on April 24, 2024 at 6:17 pm

    Nowdays we need to secure our APIs more than ever and JSON Web Tokens helps us with itContinue reading on Medium »

  • What are some popular ctfs?
    by /u/Jarvis_Creator24 (cybersecurity) on April 24, 2024 at 6:12 pm

    So I'm a middle school kid who wants to eventually work a cybersecurity job. I want to show colleges that I am proficient at this field, and I want to evaluate my own skills. Any ideas for popular CTFS? submitted by /u/Jarvis_Creator24 [link] [comments]

  • Machen Sie sich die Dezentralisierung zu eigen
    by Piurawin (Cybersecurity on Medium) on April 24, 2024 at 6:12 pm

    Nehmen Sie an CyberConnect’s Season 2 Rewards Programm teil und erleben Sie eine neue Ära des Social NetworkingContinue reading on Medium »

  • Machen Sie sich die Dezentralisierung zu eigen
    by Piurawin (Security on Medium) on April 24, 2024 at 6:12 pm

    Nehmen Sie an CyberConnect’s Season 2 Rewards Programm teil und erleben Sie eine neue Ära des Social NetworkingContinue reading on Medium »

  • The United States is at a Strategic Turning Point. In Cyberspace
    by The World of AI (Cybersecurity on Medium) on April 24, 2024 at 6:11 pm

    While America looks forward to the potential of cyberspace and associated technologies to improve the quality of human life, threats…Continue reading on Medium »

  • Embrace Decentralization
    by Piurawin (Security on Medium) on April 24, 2024 at 6:10 pm

    Join CyberConnect’s Season 2 Rewards Program for a New Era of Social NetworkingContinue reading on Medium »

  • The Invention of Lying
    by Tuğrul Ceyhan (Security on Medium) on April 24, 2024 at 6:06 pm

    Imagine a world where even politicians don’t lie. Sounds strange, right?Continue reading on New Writers Welcome »

  • Biden signs TikTok ban bill into law
    by ldstephens (Security on Medium) on April 24, 2024 at 5:45 pm

    Aisha Malik — TechCrunch “President Biden has signed a bill that would ban TikTok if its Chinese parent company, ByteDance, fails to sell…Continue reading on Medium »

  • XZ Utils Rundown: What We Learned and What To Do Next
    by /u/Offsec_Community (cybersecurity) on April 24, 2024 at 5:41 pm

    submitted by /u/Offsec_Community [link] [comments]

  • Sr. Analyst or Engineer Role?
    by /u/MadMax303 (cybersecurity) on April 24, 2024 at 5:41 pm

    Discussion topic—At what point does a Sr. Security Analyst cross into a Security Engineering role? And when would the right time be to ask for that promotion or raise? submitted by /u/MadMax303 [link] [comments]

  • Patch Now: CrushFTP Zero-Day Cloud Exploit Targets US Orgs
    by /u/CYRISMA_Buddy (cybersecurity) on April 24, 2024 at 5:30 pm

    submitted by /u/CYRISMA_Buddy [link] [comments]

  • CoralRaider attacks use CDN cache to push info-stealer malware
    by /u/CYRISMA_Buddy (cybersecurity) on April 24, 2024 at 5:24 pm

    submitted by /u/CYRISMA_Buddy [link] [comments]

  • Ring customers get $5.6 million in privacy breach settlement
    by /u/CYRISMA_Buddy (cybersecurity) on April 24, 2024 at 5:22 pm

    submitted by /u/CYRISMA_Buddy [link] [comments]

  • Innovative Solutions for Enhanced Data Security
    by OpalLock FidelityHeight (Security on Medium) on April 24, 2024 at 5:20 pm

    In the realm of data protection, Fidelity Height has long been synonymous with innovation and reliability. Our latest release, Opal Lock…Continue reading on Medium »

  • Must-Have Tools for Remote Tech Work: Empowering Modern Innovators #RemoteTechRevolution
    by Sandra O (Security on Medium) on April 24, 2024 at 5:16 pm

    Unlocking Productivity: Discover the Top Tools Revolutionizing Remote Work in TechContinue reading on Bootcamp »

  • Nontechnical GRC
    by /u/Ronin3790 (cybersecurity) on April 24, 2024 at 5:10 pm

    I’m new to doing GRC. I’m also aware there are a lot of people in GRC that aren’t technical. So to the nontechnical GRC, how do you assess controls after the developers or IT implement them? Are you using the honor system trusting others work? Do you wait for an auditor to do it or something else? submitted by /u/Ronin3790 [link] [comments]

  • How to land a Soc Analyst L1 job?
    by /u/Tempest120404 (cybersecurity) on April 24, 2024 at 4:34 pm

    Hey there, I would like to get some advice from you guys on how to transition from penetration testing to a Soc analyst L1 position. I've been Applying for the job since last month but it's failed. Also, I would like to add that I already attained some certifications like BTL1(Security Blue Team), EJPT(eLearnSecurity), and AZ-900 from Azure. what steps do you think I need to take for me to land the job? I have 5 years of experience in cybersecurity In my first 3 years I was a Technical support engineer I handled some security solutions like AV, EDR, and DLP. After my technical support engineer days, I became a Penetration tester. Thank you in advance for your advice. submitted by /u/Tempest120404 [link] [comments]

  • FTC bans non competes. F yeah.
    by /u/gawdarn (cybersecurity) on April 24, 2024 at 2:25 pm

    submitted by /u/gawdarn [link] [comments]

  • Has anyone tried SentinelOne's Purple AI? What are your thoughts on it?
    by /u/formacarta (cybersecurity) on April 24, 2024 at 2:03 pm

    submitted by /u/formacarta [link] [comments]

  • Is experience more valuable than a degree ?
    by /u/Defiant_Rip1515 (cybersecurity) on April 24, 2024 at 1:31 pm

    Hey there, So, I'm a European student currently grinding through my first year of a Bachelor's degree in IT. I've got this opportunity lined up a six-month internship as a cybersecurity analyst that could potentially lead into a full-time job. But here's the kicker: juggling work during the day and hitting the books at night is proving to be one heck of a struggle. I'm not sure I can keep this up for another two years. Here's the burning question: In the job market, what's more important—having two years of hands-on cybersecurity experience but no degree, or having that degree but lacking real-world experience? I've noticed a ton of job listings demanding a degree, so I'm curious to hear your thoughts on this dilemma. submitted by /u/Defiant_Rip1515 [link] [comments]

  • Suspected NK hackers infect AV service of Avast using MITM
    by /u/vicariouslywatching (cybersecurity) on April 24, 2024 at 1:20 pm

    https://arstechnica.com/security/2024/04/hackers-infect-users-of-antivirus-service-that-delivered-updates-over-http/ submitted by /u/vicariouslywatching [link] [comments]

  • Faking domains in google ads?
    by /u/tootac (cybersecurity) on April 24, 2024 at 11:57 am

    More than a month ago while trying to open notion I clicked on first result of google search which was an ad. Usually I don't click on ads but this time I was in a bit of hurry and didn't pay attention. The name, description but most important the link looked good but on click it opened completely different site. I recorded a video (https://youtu.be/fI3U2Blo8DY) just in a case and planned to investigate in a bit but got carried away with work and completely forgot about it. I thought that I understand how internet works but it this part is a bit confusing. One time I was helping a friend of mine to investigate similar issue with his wordpress site and we found a sneaky virus that was redirecting selected request to some Japanese store. But I don't think that this is the case with notion as they are big enough not make this types of mistakes. So can I just give arbitrary links in google ads and pretend to be any site or there is other technique that I am missing? submitted by /u/tootac [link] [comments]

  • Incident Response Guide and IRGuideBook
    by /u/Ok_Revolution5780 (cybersecurity) on April 24, 2024 at 10:56 am

    New Microsoft guide for Incident Response is great. Link to article and pdf below, i especially like the way they talk about the Forensics Artifact application along with Common Pitfalls: https://www.microsoft.com/en-us/security/blog/2024/04/23/new-microsoft-incident-response-guide-helps-simplify-cyberthreat-investigations/ https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/IR-Guidebook-Final.pdf submitted by /u/Ok_Revolution5780 [link] [comments]

  • Engaging cybersecurity student exercises during a SOC visit
    by /u/kmsec (cybersecurity) on April 24, 2024 at 10:09 am

    I am currently working as a SOC Manager, and will have 40 cybersecurity students attending our office next week to understand what we do, and also participate in a workshop focused on incident response. I intend to split the students into teams of 4 or 5 and each team will work through the same exercises independently, and I will then review feedback from each team as we progress through the exercise. The exercise will likely be a few hours. We do table top exercises with customers, but nothing of this scale. So, I need some engaging ideas that will make this exercise manageable, enjoyable and informative. I have asked ChatGPT for ideas, but I would like to know if anyone has participated in anything similar that has worked well? (FYI, It is too late at this stage to arrange a technical exercise (E.g CTF, Computer-based exercises). submitted by /u/kmsec [link] [comments]

  • Is it a good idea to get into Cybersec internship at a bank instead of a tech company ?
    by /u/Odd-Access3591 (cybersecurity) on April 24, 2024 at 8:55 am

    submitted by /u/Odd-Access3591 [link] [comments]

  • Can you help me to understand the very different figures I see in Mandiant's "M-Trends 2024" and IBM Security's "Cost of a Data Breach Report 2023"?
    by /u/Maxferrario (cybersecurity) on April 24, 2024 at 8:41 am

    Hi everyone, I'm reading Mandiant's most recent M-Trends Special Report - Excutive Edition (grab you copy here) and the second sentence is (emphasis mine) Dwell time is the number of days an attacker is on a system from compromise to detection, and in 2023 the global median dwell time is 10 days, down from 16 days in 2022 . Now, IBM Security (here) reports were different figures for what I see as similar metrics: Compared to 2022, both the mean time to identify (MTTI) and the mean time to contain (MTTC) breaches saw only marginal changes. [...] In 2022, it took organizations 207 days to identify a breach. In 2023, it took only 204 days. On the other hand, organizations required an average of 73 days to contain breaches in 2023, while they required just 70 days on average in 2022. Am I wrong in thinking that those two figures shouldn't be that different, even taking in consideration the different sample the figures are calculated from? Or I am missing something and the two reports are referring to two very different facts (i.e. "dwell tme" <> "mean time to identify")? Thanks in advance for you help and insight! submitted by /u/Maxferrario [link] [comments]

  • Security under CTO, IT under CFO
    by /u/Azurite53 (cybersecurity) on April 24, 2024 at 1:44 am

    as title states, wanted to see if this is normal or a odd org structure. Corporate devices and SaaS stuff for the workforce is managed by IT who is under the CFO, Technology created and used by the company, along with Me the Security Lead, are under the CTO. This is the first place ive had an org structure like this where different C-level folks are managing different parts of the infrastructure. CTO is very involved in Engineering and Security, CFO basically unaware of what IT does besides budget from what it seems like. Engineering under CTO has been moving towards a more mature Org, IT is in a “its always been like this” mindset. Feeling frustrated as IT is not very cooperative and slow walks anything security related, not much CTO can do, we have constant discussions about ITs ability. submitted by /u/Azurite53 [link] [comments]

  • How does a small company offering basic IT sevices address cyber security these days?
    by /u/Arvid23 (cybersecurity) on April 24, 2024 at 12:04 am

    Does the company take on a small portion of the responsibility or suggest that the company engage a full SOC submitted by /u/Arvid23 [link] [comments]

  • Why haven’t we seen Financial Loss at Bank Levels?
    by /u/teknoprep (cybersecurity) on April 23, 2024 at 9:59 pm

    One can assume that their personal information has been leaked dozens of times over the years. From SSN’s (for Americans), passwords, full names, addresses, PIN’s, and much more. One thing I’ve been surprised hasn’t happened - the electronic stealing of funds from central banks. I’m not talking about gaining access to someone’s personal bank account and draining funds. Or draining crypto. I’m talking about gaining access to central financial databases and editing balances, causing havoc and widespread panic, or simply skimming a little off the top. Can this even be done? submitted by /u/teknoprep [link] [comments]

  • Mentorship Monday - Post All Career, Education and Job questions here!
    by /u/AutoModerator (cybersecurity) on April 22, 2024 at 12:00 am

    This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cybersecurity career questions? Ask away! Interested in what other people are asking, or think your question has been asked before? Have a look through prior weeks of content - though we're working on making this more easily searchable for the future. submitted by /u/AutoModerator [link] [comments]

Pass the 2023 AWS Cloud Practitioner CCP CLF-C02 Certification with flying colors Ace the 2023 AWS Solutions Architect Associate SAA-C03 Exam with Confidence Pass the 2023 AWS Certified Machine Learning Specialty MLS-C01 Exam with Flying Colors

List of Freely available programming books - What is the single most influential book every Programmers should read



#BlackOwned #BlackEntrepreneurs #BlackBuniness #AWSCertified #AWSCloudPractitioner #AWSCertification #AWSCLFC02 #CloudComputing #AWSStudyGuide #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AWSBasics #AWSCertified #AWSMachineLearning #AWSCertification #AWSSpecialty #MachineLearning #AWSStudyGuide #CloudComputing #DataScience #AWSCertified #AWSSolutionsArchitect #AWSArchitectAssociate #AWSCertification #AWSStudyGuide #CloudComputing #AWSArchitecture #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AzureFundamentals #AZ900 #MicrosoftAzure #ITCertification #CertificationPrep #StudyMaterials #TechLearning #MicrosoftCertified #AzureCertification #TechBooks

Top 1000 Canada Quiz and trivia: CANADA CITIZENSHIP TEST- HISTORY - GEOGRAPHY - GOVERNMENT- CULTURE - PEOPLE - LANGUAGES - TRAVEL - WILDLIFE - HOCKEY - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
zCanadian Quiz and Trivia, Canadian History, Citizenship Test, Geography, Wildlife, Secenries, Banff, Tourism

Top 1000 Africa Quiz and trivia: HISTORY - GEOGRAPHY - WILDLIFE - CULTURE - PEOPLE - LANGUAGES - TRAVEL - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
Africa Quiz, Africa Trivia, Quiz, African History, Geography, Wildlife, Culture

Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada.
Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada

Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA
Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA


Health Health, a science-based community to discuss health news and the coronavirus (COVID-19) pandemic

Today I Learned (TIL) You learn something new every day; what did you learn today? Submit interesting and specific facts about something that you just found out here.

Reddit Science This community is a place to share and discuss new scientific research. Read about the latest advances in astronomy, biology, medicine, physics, social science, and more. Find and submit new publications and popular science coverage of current research.

Reddit Sports Sports News and Highlights from the NFL, NBA, NHL, MLB, MLS, and leagues around the world.

Turn your dream into reality with Google Workspace: It’s free for the first 14 days.
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes:
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6 96DRHDRA9J7GTN6
63F733CLLY7R7MM
63F7D7CPD9XXUVT
63FLKQHWV3AEEE6
63JGLWWK36CP7WM
63KKR9EULQRR7VE
63KNY4N7VHCUA9R
63LDXXFYU6VXDG9
63MGNRCKXURAYWC
63NGNDVVXJP4N99
63P4G3ELRPADKQU
With Google Workspace, Get custom email @yourcompany, Work from anywhere; Easily scale up or down
Google gives you the tools you need to run your business like a pro. Set up custom email, share files securely online, video chat from any device, and more.
Google Workspace provides a platform, a common ground, for all our internal teams and operations to collaboratively support our primary business goal, which is to deliver quality information to our readers quickly.
Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE
C37HCAQRVR7JTFK
C3AE76E7WATCTL9
C3C3RGUF9VW6LXE
C3D9LD4L736CALC
C3EQXV674DQ6PXP
C3G9M3JEHXM3XC7
C3GGR3H4TRHUD7L
C3LVUVC3LHKUEQK
C3PVGM4CHHPMWLE
C3QHQ763LWGTW4C
Even if you’re small, you want people to see you as a professional business. If you’re still growing, you need the building blocks to get you where you want to be. I’ve learned so much about business through Google Workspace—I can’t imagine working without it.
(Email us for more codes)

error: Content is protected !!