Impersonation is going to run rampant with all this social media fracturing.
This is my validation post.
I am only on the following:
- Twitter:
@FrankMcG
- LinkedIn: /in/frankmcgovern/
- Mastodon: frankmcg
@infosec
.exchange
- Discord: frankmcg
- Reddit: u/FrankMcG
I’m seeing people publicly share the name and social media links of the compromised
#Okta
user.
Don’t do this. Don’t even look at their LinkedIn. Don’t say their name. Don’t even approach the topic.
This could happen to any one of us; the actual user is irrelevant.
Be better.
Wait, really? 😂😂😂
“Though it seemed completely automated, Just Walk Out relied on more than 1,000 people in India watching and labeling videos to ensure accurate checkouts”
The true AI. Now I want to know how many people are behind the scenes responding in
@ChatGPTapp
.
Have any of you with unlimited PTO really tried to test it out?
I’m talking take like every Friday or every other Friday off for a whole year.
Implement the 4-day work week yourself.
Hi, I’m Frank. I’m the sole Cybersecurity Architect for a Fortune 100 org.
I barely know code.
I barely know scripting.
I barely know containers.
I barely know forensics.
I’ve never popped a shell.
You’ll be OK. I depend on coworkers & other SME’s to fill me in while I learn.
A lot of debate about if you need to know how to code to be in security. Is the dev community having a debate about how you need to know security to be a real dev?
What the hell happened to this tweet.
I don’t need money, but others do. Please consider donating to good causes like
@HackersHealth
.
Also:
- Enable MFA on your accounts
- Use a password manager
- Run Windows Updates
- Uninstall Adobe Flash
@trek
Because you’ve been on the sales side for so long that you’re starting to believe that a vendor can truly solve every use case and problem and will give you exclusive white glove service at all times.
Kali Linux creators (
@offsectraining
) announce free cyber security sessions (PEN-200) delivered live on Twitch.
Two 60-minute sessions every week for 25 weeks, starting on 22 June 2022. Every Wednesday and Friday between 17:00 and 18:00 (BST).
ServiceNow. They offer you basically nothing for millions but then you have to go build it all yourself with millions more.
It’s like if you asked me to build cybersecurity policies for your org and I just went and purchased Microsoft Word and installed it and said “done”.
Fun fact: Many of the sites don’t actually do anything regardless of what you click. Some don’t store cookies, some store even if you click deny, some don’t do at all what you customize.
It’s all made up and the points don’t matter.
SANS is now approaching $7,500 a class??
Jeeze, they are loving to milk the industry. I remember when it was still in the $3k-$5k range and even that was crazy.
Where is the competition?
Just a reminder. You will probably never see me refer to myself as an expert. I just work in cybersecurity.
Remember that this field has all of these verticals and I doubt anyone on the planet knows all of them.
I can speak to a lot of these, but there is so much I don’t know.
SEC is charging SolarWinds CISO for their breach due to hiding and inaccurately painting their security posture picture.
I probably know a few “people-leader CISO’s” that probably fall into this. Be warned. Know what you’re doing or let someone else lead.
I went to Iraq twice.
I’ve had friends I know die for the USA.
I’ve taken life for the USA.
I love fireworks. Usually buy them annually.
I honestly find this 4th of July with zero excitement and no enjoyment.
This is not the country I went to the Marines for. It’s all a lie.
Microsoft Teams users:
They have enabled a new feature starting TODAY that accounts not managed by an org can be messaged and those accounts can also message your org.
🚨It is enabled by DEFAULT.🚨
You likely do not want at least the checkbox enabled.
Splunk and Sentinel costs. 🤯
How do you actually justify ROI? There’s no way. I knew they were decently expensive, but like I thought maybe 30% of where it is.
This market needs a hella correction. Have gotten way too greedy.
#Okta
:
1. Share the information internally.
2. Collect and retain related logs.
3. Hunt logs for bad.
4. Rotate Okta privileged passwords.
5. Move on unless Okta reaches out to you that you are involved. Adjust DFIR to their context.
That’s about all you can do right now.
People like to make fun of the
@USCG
and as a former Marine, I get asked often “who’s the toughest branch?” My answer is always “the USCG” without delay.
Why? Because they fly INTO storms and hurricanes and then JUMP INTO THEM. Would you? I’m good on land with my rifle.
Put all your passwords in a password manager and put that master password in your will. Help your survivors by making it easy for them. Don’t forget your digital surface when it comes to death.
Many blogs tell you about what Microsoft E5 gets you (which is a lot), but none really write about “I bought Microsoft E5, where do I start?”
I wrote a blog that outlines how you should implement the Microsoft E5 stack in a planned approach.
AWS Monthly Budget
💰Revenue: $10,000
Lambda: ~$2,300
Load Balancing: $750
Firewall-as-a-Service: $1,600
S3 PUT Requests: $732,943
VPN: $163
Someone who is good at the cloud, please help, my resources are starving.
People will stan a CEO billionaire that is PUBLICLY SHITTING on his own team but then call out employees for responding to that PUBLIC SHITTING in a defensive way. Amazing.
If my manager publicly shit on my work on here, you’re god damn right I would yeet my job into space.
@SwiftOnSecurity
Welcome to every main tech company in existence right now. Never look at the financials. You’ll realize we have a long way to go down because it’s all made up and the points don’t matter.
Companies evaluated as “worth” billions of dollars and have only lost money.
Going to write a blog on what a Cybersecurity Architect is and does day-to-day.
Anything specific you’d like to see or learn? If you’re an architect, any areas I should make sure I cover?
As former military intel, I only have a few easy things to say:
- China is not going to go to war with us.
- Russia is not and cannot go to war with us.
- North Korea can’t go to war with us.
- Iran can’t go to war with us.
It’s all fear-mongering to keep you busy.
/TED Talk
I’m just waiting for when ransomware starts changing data as it decrypts for you.
Ransomware is the tip of the iceberg. How many have you fully solved data integrity protections? I’ll wait while you lie. Much greater risks and concerns. What do you do if your data is all muddy?
Today I slept to 10am, laid in bed on my phone doing nothing of value, then fell back asleep until 2pm. Got up and watched two episodes of Seinfeld while eating cereal. Then, fell asleep on the couch for 2 hours. About to eat dinner and then play WoW for ~5 hours.
Bomb ass day.
Please stop being the person that joins the meeting at the 5-minute reminder message so that it tells everyone the meeting is started and they feel pressured to join early.
Fun fact. You can wash a properly seasoned cast iron in soap and water. Way too many people do not know this. It’s a myth that it can never touch soap and water.
“Infosec is a cost center/drain on expenses.”
I’m tired of hearing this about any services group.
Drop an infantryman in a combat zone and remove pay, food, supply, intelligence, and communication and let me know how he does.
This is old guard thinking and it’s growing tiring.
When discussing going to a 4-day work week, please stop saying 4x10’s.
The real path is to a 4-day work week with 8-hours a day still.
The 40 hours a week is an arbitrary number and with technology isn’t necessary anymore.
The goal is 4x8. Nothing less.
Second order of business now that I’m not working for anyone:
✅ Fuck you Kevin Mitnick and your sock account of the name Garth Richards that you used to try and get me fired in 2019 for calling you out as the charlatan you are.
Please. Stop. Emailing. Personal. Information.
When applying for a mortgage. When applying for an auto loan. When looking to retain a lawyer. When signing up for new credit.
Please, please, please. Demand a secure upload site. Don’t use them if they don’t have one. It’s 2023.
Did you know the Windows Store in Windows 10 allows anything to be installed?
Did you know that it installs differently than running an executable so it most likely is circumventing your application whitelisting product?
Control via Intune or GPO or applocker.
I'm creating an email security product called Void that automatically deletes every inbound email permanently. Will be able to claim and guarantee ZERO PHISHING within seconds after deployment.
I’m seeking investors at this time.
Please, for the love of god, stop using debit cards day-to-day.
Literally do not use them unless it’s an absolute last resort and you do a forensics analysis for 30mins on the machine you’re putting it into. You have 0 protection if the money goes.
Stop. Using. Debit. Cards.
Executives and Directors: “Microsoft E5 is ridiculous with price and we can’t put all our eggs in one basket. Way too risky. Why is every feature in E5?!? I’m not paying for that.”
Also, them: “ServiceNow is sweet! We can do it all in one! Millions you say? Awesome! Buy it!”
Those of you on
@MicrosoftTeams
, you actually can upload custom backgrounds. Coworker discovered this fun nugget.
Go to ‘%APPDATA%\Roaming\Microsoft\Teams\Backgrounds\Uploads’
Once uploaded, will appear as an option in the list.
Have fun!
Whelp, it was a fun run.
See you later,
@Reddit
. I have ZERO interest in using your official app.
I’ll also start my transition removing myself as head mod a top 1% subreddit with 760k+ subscribers.
End of an era. Digg > Reddit > ???
If you’re active on Twitter and work at a company doing infosec, I recommend you mix up what technologies you post about. It’s very easy to determine what tech stack is at a company by scraping what vulns and complaints you make. Throw in other products you don’t use sometimes.
In my opinion, Cybersecurity has only been “mainstream” for barely over a decade.
Due to that, I’d argue no one is an expert at it. So if you have imposter syndrome, realize no one truly knows what they’re doing because this is all brand new and wildly advancing.
I see WAY too many people working through lunch because “I need to get stuff done” or “I didn’t get enough done yesterday”.
Please, stop. The work doesn’t end. It always exists. It’ll wait for you.
You are also a human and need fuel.
Take 👏🏼 your 👏🏼 breaks.
In your 5-year org roadmap for Cybersecurity, you should have a full year where no new tools are onboarded.
Work on finishing those tools implemented to 90% and understand what your capability is. You likely don’t need a new tool for a gap.
People live in their limited scope and forget that cybersecurity is more than engineers, SOC, and hackers.
GRC, for example, is a great area where someone can excel and do it only from 9-5 and be here for the paycheck. E.g., someone doing third-party risk assessments full-time.
Aren’t most of these people “new”? This is a really bad way to start out your career.
If anyone’s creating a list of names, I’ll take it. I’ll make sure men like this never work for companies I’m a part of.
Fucking respect others.
“She’s dumb as fuck, she might be the horny one tho”
“Should send her to jerry”
“The babies would be a sight to see”
“She’s at least physically attractive”
“I wouldn’t kick her out of bed if she kept her mouth shut”
From BowTiedCybers discord server
Should I continue?
What’s life as a Cybersecurity Architect at a Fortune 100?
Today is 8am to 2pm with 0 breaks. That was 9 different meetings. I then get 2-2:20pm to hopefully eat. Then 2:30 to 4:30pm is 4 more meetings.
Tomorrow is 8am to 6pm and 13 meetings. Only 1 hour of breaks in that.
Ever wondered “what Azure AD role do I actually need to give someone to complete their task?” or “what role should someone be able to PIM/JIT to for their work?”
This Microsoft Docs page shows you the least privileged role to complete a task in Azure AD.
What are your thoughts on a CISO not being technical? It’s ok if your answer is “it depends,” but if so, what does it depend on?
For example, what if your CISO has never deployed a server in the cloud or can’t build a script or has never configured a rule on a firewall.
Oracle has made a change to licensing. Shocking, right?
For Oracle Java now, you must license for ALL users in the environment if you have ONE instance of it. It’s no longer to only license the server/CPU counts.
I cannot emphasize enough to rid of it.
I’m going to make a business one day and employees will only work 4 days a week and less than 8 hours a day and they’ll still be compensated the same and have all the benefits.
And I’m going to steal all your best employees because of it.
Good luck.
The great
@ATT
tried rolling out their fake 5G to the Chicagoland area today.
It proceeded to completely brick phones so bad that you can’t even connect to WiFi.
If you have AT&T, disable LTE to fix.
Expected fix time for area isn’t until 8pm.
Identity is slept on.
Cybersecurity Engineers will eventually be saturated and many can do it with ease.
Identity is much harder and requires deeply understanding the root of trust and AAA. Not many getting into it, so it will be more highly sought after eventually. $$$$
I have 0 interest in ever going to an office again for more than 2 days/week. That’s the opposite way I want my life to exist and go for a work/life balance.
My entire days are ruined now when I go the office. I lose 2 hours of sleep, I lose more evening time, & tasks build up.
Too many of the same people invited to events or once someone is twitter “famous” enough.
Start paying attention to people with only 50 or 500 or 2,000 followers.
Someone’s opinion isn’t valid once they hit a certain threshold and the large follower accounts are doing fine.
Netflix is going to kill themselves with cracking down on “shared accounts.” There is no legitimate way to get it right. The algorithm will have so many false-positives.
People with multiple homes. People that travel. People that use at work and home. Military.