Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Here's a question:

Here's a question:

Scheduled Pinned Locked Moved Uncategorized
infosec
9 Posts 6 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • infoseclogger@infosec.exchangeI This user is from outside of this forum
    infoseclogger@infosec.exchangeI This user is from outside of this forum
    infoseclogger@infosec.exchange
    wrote last edited by
    #1

    Here's a question:

    What's the cybersecurity hill you're willing to kill on? (I ain't dying for this stuff).

    #infosec

    cr0w@infosec.exchangeC siliconshecky@infosec.exchangeS iagox86@infosec.exchangeI sharkfie@cyberplace.socialS nerdpr0f@infosec.exchangeN 5 Replies Last reply
    0
    • infoseclogger@infosec.exchangeI infoseclogger@infosec.exchange

      Here's a question:

      What's the cybersecurity hill you're willing to kill on? (I ain't dying for this stuff).

      #infosec

      cr0w@infosec.exchangeC This user is from outside of this forum
      cr0w@infosec.exchangeC This user is from outside of this forum
      cr0w@infosec.exchange
      wrote last edited by
      #2

      @infoseclogger Without a decent asset inventory, everything else is just checking boxes.

      1 Reply Last reply
      0
      • infoseclogger@infosec.exchangeI infoseclogger@infosec.exchange

        Here's a question:

        What's the cybersecurity hill you're willing to kill on? (I ain't dying for this stuff).

        #infosec

        siliconshecky@infosec.exchangeS This user is from outside of this forum
        siliconshecky@infosec.exchangeS This user is from outside of this forum
        siliconshecky@infosec.exchange
        wrote last edited by
        #3

        @infoseclogger So many to choose from. I guess the one that irks me is letting things go EOL and expecting mitigations only.

        1 Reply Last reply
        0
        • infoseclogger@infosec.exchangeI infoseclogger@infosec.exchange

          Here's a question:

          What's the cybersecurity hill you're willing to kill on? (I ain't dying for this stuff).

          #infosec

          iagox86@infosec.exchangeI This user is from outside of this forum
          iagox86@infosec.exchangeI This user is from outside of this forum
          iagox86@infosec.exchange
          wrote last edited by
          #4

          @infoseclogger you only need the tiniest bit of password complexity to be safe. How long it takes to crack the hash basically doesn't matter. What you really need is uniqueness, and a password manager

          infoseclogger@infosec.exchangeI 1 Reply Last reply
          0
          • infoseclogger@infosec.exchangeI infoseclogger@infosec.exchange

            Here's a question:

            What's the cybersecurity hill you're willing to kill on? (I ain't dying for this stuff).

            #infosec

            sharkfie@cyberplace.socialS This user is from outside of this forum
            sharkfie@cyberplace.socialS This user is from outside of this forum
            sharkfie@cyberplace.social
            wrote last edited by
            #5

            @infoseclogger most endpoint security software (and plain antivirus) is built on layers of vulnerable components and I don't have a solution

            infoseclogger@infosec.exchangeI 1 Reply Last reply
            0
            • infoseclogger@infosec.exchangeI infoseclogger@infosec.exchange

              Here's a question:

              What's the cybersecurity hill you're willing to kill on? (I ain't dying for this stuff).

              #infosec

              nerdpr0f@infosec.exchangeN This user is from outside of this forum
              nerdpr0f@infosec.exchangeN This user is from outside of this forum
              nerdpr0f@infosec.exchange
              wrote last edited by
              #6

              @infoseclogger Two things.

              1) Cybersecurity is no longer a rapidly changing industry. We, more or less, know how to do things well. It hasn't been for 5... maybe 10 years at this point.

              2) Cybersecurity is a half-hearted attempt at turning computing into an engineering field. In 20 years, assuming the world doesn't get destroyed, I think we'll be talking about it more in terms of 'computing safety engineering" or something similar.

              infoseclogger@infosec.exchangeI 1 Reply Last reply
              0
              • sharkfie@cyberplace.socialS sharkfie@cyberplace.social

                @infoseclogger most endpoint security software (and plain antivirus) is built on layers of vulnerable components and I don't have a solution

                infoseclogger@infosec.exchangeI This user is from outside of this forum
                infoseclogger@infosec.exchangeI This user is from outside of this forum
                infoseclogger@infosec.exchange
                wrote last edited by
                #7

                @sharkfie

                Been there. Sharing something you find with product vendor and getting the 'feature not bug' talk is painful.

                1 Reply Last reply
                0
                • nerdpr0f@infosec.exchangeN nerdpr0f@infosec.exchange

                  @infoseclogger Two things.

                  1) Cybersecurity is no longer a rapidly changing industry. We, more or less, know how to do things well. It hasn't been for 5... maybe 10 years at this point.

                  2) Cybersecurity is a half-hearted attempt at turning computing into an engineering field. In 20 years, assuming the world doesn't get destroyed, I think we'll be talking about it more in terms of 'computing safety engineering" or something similar.

                  infoseclogger@infosec.exchangeI This user is from outside of this forum
                  infoseclogger@infosec.exchangeI This user is from outside of this forum
                  infoseclogger@infosec.exchange
                  wrote last edited by
                  #8

                  @nerdpr0f

                  #1 is why I don't soil myself over AI. It found a new way to do the thing you should already be monitoring for. Wow.

                  #2 - I think infosec should be taught almost like a humanities field. it's about people behavior as much as technical anything.

                  1 Reply Last reply
                  0
                  • iagox86@infosec.exchangeI iagox86@infosec.exchange

                    @infoseclogger you only need the tiniest bit of password complexity to be safe. How long it takes to crack the hash basically doesn't matter. What you really need is uniqueness, and a password manager

                    infoseclogger@infosec.exchangeI This user is from outside of this forum
                    infoseclogger@infosec.exchangeI This user is from outside of this forum
                    infoseclogger@infosec.exchange
                    wrote last edited by
                    #9

                    @iagox86

                    What you need is leadership and policy that let you enforce the use of a password manager.

                    1 Reply Last reply
                    1
                    0
                    • R relay@relay.infosec.exchange shared this topic
                    Reply
                    • Reply as topic
                    Log in to reply
                    • Oldest to Newest
                    • Newest to Oldest
                    • Most Votes


                    • Login

                    • Login or register to search.
                    • First post
                      Last post
                    0
                    • Categories
                    • Recent
                    • Tags
                    • Popular
                    • World
                    • Users
                    • Groups