InfoSec_Infosec's profile picture.

Infosec Guy

@InfoSec_Infosec

NFL had a breach of the phone numbers of the draftees. There's no reason a DE coach should have had Shedeur Sanders phone number. GM, Coach, and maybe the owner should have role-based access - and just-in-time in an accessible enterprise system. #fail #CyberSecurity #identity


"Identity is the new Perimeter." Amen.


Infosec Guy reposted

For those asking how I got a job as a SOC analyst, here is what I did, simplified: 1. Helpdesk Job 2. AZ-900 SC-900 3. Projects on Github (no idea how this affected my odds) 4. Optimized Linkedin to mirror my resume. 5. Applied to everything I could get my hands on. 6. Luck.


SailPoint's IPO will begin the long overdue wave of companies going public. This is one of the few Cybersecurity solutions that has a positive ROI on productivity. Definitely buying this stock.

1/ Intro The software IPO window in 2025 is officially open. We did a summary below, thanks @amdecamillo + @ausw2000. SailPoint ($SAIL) is the first software IPO to file in 2025 and will likely be the start of many others. The company is over $800M in ARR, growing 30%…

afc's tweet image. 1/ Intro

The software IPO window in 2025 is officially open. 

We did a summary below, thanks @amdecamillo + @ausw2000.

SailPoint ($SAIL) is the first software IPO to file in 2025 and will likely be the start of many others. The company is over $800M in ARR, growing 30%…


Infosec Guy reposted

I’ve hired for cybersecurity roles - here’s how to make sure YOU stand out. 👇

This post is unavailable.

Proving once again that Identity is the new perimeter.

BREAKING: Chinese hackers accessed Yellen's computer in US Treasury breach, per Bloomberg.



Infosec Guy reposted

ECU Health reflected on their identity security achievements, and shared why they see identity security as essential to their business with SailPoint: slpnt.co/3ZTxuE6


When sharing a link, does anyone else delete the URL to from the question mark to the end?


If CISO's want to stop groveling for money every time a breach occurs, put in a best-in-class IAM solution. It touches almost every function in a business and has tangible ROI. #IAM #IGA


Infosec Guy reposted

If you are only using Endpoint security policies for Defender AV, you are missing some great features :( One of my favorites is the ability to scan exclusions during quick scan :) I have a supplemental Settings Catalog policy for "missing" features here: github.com/nathanmcnulty/…

NathanMcNulty's tweet image. If you are only using Endpoint security policies for Defender AV, you are missing some great features :(

One of my favorites is the ability to scan exclusions during quick scan :)

I have a supplemental Settings Catalog policy for "missing" features here:
github.com/nathanmcnulty/…

What is the most important Cybersecurity function?


Infosec Guy reposted

Okta Learning’s "What’s Next" program is offering a learning grant that helps you dive into Identity and Access Management (IAM) Get access to Okta’s on demand course catalog, 1 Premier Practice Exam, and 1 Certification Exam Voucher Details below: regionalevents.okta.com/whatsnextbyokt…


Infosec Guy reposted

Identity and Access Management for VMware Cloud Foundation dy.si/oJRnsb2

widmerkarl's tweet image. Identity and Access Management for VMware Cloud Foundation dy.si/oJRnsb2

Outstanding cheat sheet for CISSP certification

Security Operations Cheatsheet

harshleenchawl2's tweet image. Security Operations Cheatsheet


CISO's, per Gartner's latest CIO Report, say that Cybersecurity talent is hard to find. Further, that talent does not stick around very long. Why? Generally because their directives fall on deaf ears.


In Gartner's latest CIO Report, it calculates the annual global damage cost from Cybersecurity breaches at a whopping 6 Trillion (yes, Trillion) dollars.


Large companies pay between 20-30 Cybersecurity vendors to thwart threats. Instead of using unallocated budget to add a tool each time the threat morphs, CISO's should employ a comprehensive organizational strategy.


Don't let near misses drive your Cybersecurity budget. Believe it or not, these "misses" make your operation non-strategic. If you need water every time you fight fires, your CIO and Board of Directors will never give you the comprehensive solution you seek to prevent the fire.


Can you believe the Chief Information Security Officer (CISO) role has been around about 20 years? Why do you think the modis operandi is still reactive?


Why do CISO's leave their organization? #1 reason is "not seeing eye to eye with executive leadership". This is code for a bottom up, reactive security operation. It also likely means that near misses drive the behavior of the company.


United States Trends

Loading...

Something went wrong.


Something went wrong.