<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Here&#x27;s a question:]]></title><description><![CDATA[<p>Here's a question:</p><p>What's the cybersecurity hill you're willing to kill on? (I ain't dying for this stuff).</p><p><a href="https://infosec.exchange/tags/infosec" rel="tag">#<span>infosec</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/a5793cff-088b-47ab-af1e-521d4f2fc196/here-s-a-question</link><generator>RSS for Node</generator><lastBuildDate>Fri, 01 May 2026 07:58:29 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/a5793cff-088b-47ab-af1e-521d4f2fc196.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 30 Apr 2026 20:18:50 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Here&#x27;s a question: on Thu, 30 Apr 2026 20:50:08 GMT]]></title><description><![CDATA[<p><span><a href="/user/iagox86%40infosec.exchange">@<span>iagox86</span></a></span> </p><p>What you need is leadership and policy that let you enforce the use of a password manager.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/infoseclogger/statuses/116495627636433376</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/infoseclogger/statuses/116495627636433376</guid><dc:creator><![CDATA[infoseclogger@infosec.exchange]]></dc:creator><pubDate>Thu, 30 Apr 2026 20:50:08 GMT</pubDate></item><item><title><![CDATA[Reply to Here&#x27;s a question: on Thu, 30 Apr 2026 20:44:00 GMT]]></title><description><![CDATA[<p><span><a href="/user/nerdpr0f%40infosec.exchange">@<span>nerdpr0f</span></a></span> </p><p>#1 is why I don't soil myself over AI. It found a new way to do the thing you should already be monitoring for. Wow.</p><p>#2 - I think infosec should be taught almost like a humanities field. it's about people behavior as much as technical anything.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/infoseclogger/statuses/116495603506615635</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/infoseclogger/statuses/116495603506615635</guid><dc:creator><![CDATA[infoseclogger@infosec.exchange]]></dc:creator><pubDate>Thu, 30 Apr 2026 20:44:00 GMT</pubDate></item><item><title><![CDATA[Reply to Here&#x27;s a question: on Thu, 30 Apr 2026 20:42:34 GMT]]></title><description><![CDATA[<p><span><a href="/user/sharkfie%40cyberplace.social" rel="nofollow noopener">@<span>sharkfie</span></a></span> </p><p>Been there. Sharing something you find with product vendor and getting the 'feature not bug' talk is painful.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/infoseclogger/statuses/116495597876328963</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/infoseclogger/statuses/116495597876328963</guid><dc:creator><![CDATA[infoseclogger@infosec.exchange]]></dc:creator><pubDate>Thu, 30 Apr 2026 20:42:34 GMT</pubDate></item><item><title><![CDATA[Reply to Here&#x27;s a question: on Thu, 30 Apr 2026 20:26:15 GMT]]></title><description><![CDATA[<p><span><a href="/user/infoseclogger%40infosec.exchange">@<span>infoseclogger</span></a></span> Two things.</p><p>1) Cybersecurity is no longer a rapidly changing industry. We, more or less, know how to do things well. It hasn't been for 5... maybe 10 years at this point.</p><p>2) Cybersecurity is a half-hearted attempt at turning computing into an engineering field. In 20 years, assuming the world doesn't get destroyed, I think we'll be talking about it more in terms of 'computing safety engineering" or something similar.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/nerdpr0f/statuses/116495533693924109</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/nerdpr0f/statuses/116495533693924109</guid><dc:creator><![CDATA[nerdpr0f@infosec.exchange]]></dc:creator><pubDate>Thu, 30 Apr 2026 20:26:15 GMT</pubDate></item><item><title><![CDATA[Reply to Here&#x27;s a question: on Thu, 30 Apr 2026 20:25:58 GMT]]></title><description><![CDATA[<p><span><a href="/user/infoseclogger%40infosec.exchange">@<span>infoseclogger</span></a></span> most endpoint security software (and plain antivirus) is built on layers of vulnerable components and I don't have a solution</p>]]></description><link>https://board.circlewithadot.net/post/https://cyberplace.social/ap/users/116440692978306561/statuses/116495532575357174</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://cyberplace.social/ap/users/116440692978306561/statuses/116495532575357174</guid><dc:creator><![CDATA[sharkfie@cyberplace.social]]></dc:creator><pubDate>Thu, 30 Apr 2026 20:25:58 GMT</pubDate></item><item><title><![CDATA[Reply to Here&#x27;s a question: on Thu, 30 Apr 2026 20:25:41 GMT]]></title><description><![CDATA[<p><span><a href="/user/infoseclogger%40infosec.exchange">@<span>infoseclogger</span></a></span> you only need the tiniest bit of password complexity to be safe. How long it takes to crack the hash basically doesn't matter. What you really need is uniqueness, and a password manager</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/iagox86/statuses/116495531476837770</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/iagox86/statuses/116495531476837770</guid><dc:creator><![CDATA[iagox86@infosec.exchange]]></dc:creator><pubDate>Thu, 30 Apr 2026 20:25:41 GMT</pubDate></item><item><title><![CDATA[Reply to Here&#x27;s a question: on Thu, 30 Apr 2026 20:22:49 GMT]]></title><description><![CDATA[<p><span><a href="/user/infoseclogger%40infosec.exchange">@<span>infoseclogger</span></a></span> So many to choose from. I guess the one that irks me is letting things go EOL and expecting mitigations only.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/siliconshecky/statuses/116495520194258190</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/siliconshecky/statuses/116495520194258190</guid><dc:creator><![CDATA[siliconshecky@infosec.exchange]]></dc:creator><pubDate>Thu, 30 Apr 2026 20:22:49 GMT</pubDate></item><item><title><![CDATA[Reply to Here&#x27;s a question: on Thu, 30 Apr 2026 20:22:24 GMT]]></title><description><![CDATA[<p><span><a href="/user/infoseclogger%40infosec.exchange">@<span>infoseclogger</span></a></span> Without a decent asset inventory, everything else is just checking boxes.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/cR0w/statuses/116495518553621360</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/cR0w/statuses/116495518553621360</guid><dc:creator><![CDATA[cr0w@infosec.exchange]]></dc:creator><pubDate>Thu, 30 Apr 2026 20:22:24 GMT</pubDate></item></channel></rss>