Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

jimguckin@infosec.exchangeJ

jimguckin@infosec.exchange

@jimguckin@infosec.exchange
About
Posts
11
Topics
11
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • We keep calling them leaders…
    jimguckin@infosec.exchangeJ jimguckin@infosec.exchange

    We keep calling them leaders…

    But a lot of them are just managing.

    A manager tells you what to do.
    A leader helps you grow.

    New article: Not Every Manager Is a Leader (And That’s the Problem)

    Link Preview Image
    Not Every Manager Is a Leader (And That’s the Problem) – Jim Guckin

    favicon

    (jimguckin.com)

    #Leadership #Mentorship #CareerGrowth

    Uncategorized leadership mentorship careergrowth

  • From the security team’s perspective:“The system is isolated” is more of a suggestion than a fact.
    jimguckin@infosec.exchangeJ jimguckin@infosec.exchange

    From the security team’s perspective:
    “The system is isolated” is more of a suggestion than a fact.

    #CyberSecurity #NetworkSecurity #HardTruths

    Uncategorized cybersecurity networksecurity hardtruths

  • Information Security things that sound fake but aren’t:“Evil Twin.”
    jimguckin@infosec.exchangeJ jimguckin@infosec.exchange

    Information Security things that sound fake but aren’t:
    “Evil Twin.”

    Not a soap opera plot.
    Just a rogue WiFi access point impersonating a legitimate network.

    #CyberSecurity #WiFiSecurity #SecurityTermsThatSoundFake

    Uncategorized cybersecurity wifisecurity securitytermsth

  • Information Security terms that sound fake but aren’t:“Pass-the-Hash.”
    jimguckin@infosec.exchangeJ jimguckin@infosec.exchange

    Information Security terms that sound fake but aren’t:
    “Pass-the-Hash.”

    No, it’s not a weird crypto game.
    It’s a way attackers move laterally without knowing your password.

    #CyberSecurity #IdentitySecurity #ThreatIntel #SecurityTermsThatSoundFake

    Uncategorized cybersecurity identitysecurit threatintel securitytermsth

  • Every organization has a “Mike.”
    jimguckin@infosec.exchangeJ jimguckin@infosec.exchange

    Every organization has a “Mike.”

    The one who knows how everything works.

    That’s not a strength. That’s a risk.

    New article: When Security Architecture Depends on Tribal Knowledge

    Link Preview Image
    When Security Architecture Depends on Tribal Knowledge – Jim Guckin

    favicon

    (jimguckin.com)

    #CyberSecurity #SecurityArchitecture #InfoSec #SecurityLeadership

    Uncategorized cybersecurity securityarchite infosec securityleaders

  • #Pennsylvania got new license plates, and I’ve seen 3 NCC plates, and thought I was surrounded by #trekkies representing their favorite ships…only to google a few and realize it’s just NCCs turn in rotation.
    jimguckin@infosec.exchangeJ jimguckin@infosec.exchange

    #Pennsylvania got new license plates, and I’ve seen 3 NCC plates, and thought I was surrounded by #trekkies representing their favorite ships…only to google a few and realize it’s just NCCs turn in rotation. 😩

    #StarTrek #Nerd #WhtalltheNCCLicensePlates

    Uncategorized pennsylvania trekkies startrek nerd whtallthencclic

  • Information Security terms that sound fake but aren’t:“Golden Ticket attack.”
    jimguckin@infosec.exchangeJ jimguckin@infosec.exchange

    Information Security terms that sound fake but aren’t:
    “Golden Ticket attack.”

    Unfortunately it does not grant access to a chocolate factory.
    It does grant access to your entire Active Directory.

    #CyberSecurity #ActiveDirectory #ThreatIntel #SecurityTermsThatSoundFake

    Uncategorized cybersecurity activedirectory threatintel securitytermsth

  • Finished #StarfleetAcademy and a tiny canon thing irrationally annoyed me.
    jimguckin@infosec.exchangeJ jimguckin@infosec.exchange

    Finished #StarfleetAcademy and a tiny canon thing irrationally annoyed me. They call Reno “Commander” while she’s in command of the ship, Caleb says “Captain,” she corrects him. But #DS9 established whoever commands the ship is called Captain. Just me?

    #StarTrek #SFA #nerd

    Uncategorized starfleetacadem ds9 startrek sfa nerd

  • CISA added Ivanti, SolarWinds, and Workspace ONE vulnerabilities to the KEV list after confirmed exploitation in the wild.
    jimguckin@infosec.exchangeJ jimguckin@infosec.exchange

    CISA added Ivanti, SolarWinds, and Workspace ONE vulnerabilities to the KEV list after confirmed exploitation in the wild.

    When a vuln hits KEV, attackers are already using it.

    Time to patch immediately!

    Link Preview Image
    CISA shortens patch deadline for critical Ivanti, SolarWinds bugs

    The Cybersecurity and Infrastructure Security Agency (CISA) gave all federal civilian agencies until Thursday to patch CVE-2025-26399 — a critical vulnerability impacting the popular SolarWinds Web Help Desk.

    favicon

    (therecord.media)

    #CyberSecurity #ThreatIntel #PatchNow

    Uncategorized cybersecurity threatintel patchnow

  • Things I’ve heard that made me uncomfortable:“That server has been running so long no one knows what it does.”#LegacySystems #ITLife #ThingsIHeard
    jimguckin@infosec.exchangeJ jimguckin@infosec.exchange

    Things I’ve heard that made me uncomfortable:
    “That server has been running so long no one knows what it does.”
    #LegacySystems #ITLife #ThingsIHeard

    Uncategorized legacysystems itlife thingsiheard

  • APT28 (Fancy Bear) is exploiting a Windows zero-day (CVE-2026-21513) using malicious LNK files.
    jimguckin@infosec.exchangeJ jimguckin@infosec.exchange

    APT28 (Fancy Bear) is exploiting a Windows zero-day (CVE-2026-21513) using malicious LNK files.

    Zero-day + phishing = still one of the most reliable attack paths.

    All it takes is one wrong click to ruin your day!

    Just a moment...

    favicon

    (thehackernews.com)

    #CyberSecurity #ZeroDay #ThreatIntel

    Uncategorized cybersecurity zeroday threatintel
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups