mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

790
active users

#ciso

2 posts2 participants0 posts today
Hans-Cees 🌳🌳🤢🦋🐈🐈🍋🍋🐝🐜<p><span class="h-card" translate="no"><a href="https://mastodon.nl/@patrickborsoi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>patrickborsoi</span></a></span> thanks for the <a href="https://ieji.de/tags/cisoMindmap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cisoMindmap</span></a> <a href="https://ieji.de/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://ieji.de/tags/ciso" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ciso</span></a></p>
Mathilde<p>Me when I try to reach out to our company Chief Information Security Officer (<a href="https://freeradical.zone/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a>), using the only true, great, instant messaging system, <span class="h-card" translate="no"><a href="https://mastodon.matrix.org/@matrix" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>matrix</span></a></span>, with <span class="h-card" translate="no"><a href="https://mastodon.matrix.org/@element" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>element</span></a></span></p><p><a href="https://freeradical.zone/tags/matrix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>matrix</span></a> <a href="https://freeradical.zone/tags/element" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>element</span></a> <a href="https://freeradical.zone/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://freeradical.zone/tags/bullshit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bullshit</span></a> <a href="https://freeradical.zone/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://freeradical.zone/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://freeradical.zone/tags/opsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opsec</span></a> <a href="https://freeradical.zone/tags/InstantMessaging" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InstantMessaging</span></a> <a href="https://freeradical.zone/tags/federation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>federation</span></a> <a href="https://freeradical.zone/tags/IM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IM</span></a> <a href="https://freeradical.zone/tags/chat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chat</span></a></p>
sͧb̴ͫƸ̴gͬᵉ<p>I think <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> have given themselves enough rope with <a href="https://infosec.exchange/tags/Recall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Recall</span></a>. For Reasons, running anything like it would be flat out, no discussion, illegal in my org. As <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> I’m sensitive to such things… :) </p><p>Sure we run a MSFT shop, and sure they theoretically have access to all that data anyhow - can’t [viably yet] process ciphertext, they see all the cleartext at some point.</p><p>The rope part is that argument. If MSFT argues that they see all data *anyway* so why not Recall, they burst our collective hallucination that various <a href="https://infosec.exchange/tags/GDPR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GDPR</span></a> agreements are actually worth a damn [Narrator: They’re not].</p><p>And then, my <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> friends, I get to eject Microsoft - and coincidentally all other <a href="https://infosec.exchange/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> services as well as collateral damage - and finally build a full scale Linux/FOSS environment.</p><p>It’ll be more fun than I can <a href="https://infosec.exchange/tags/recall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>recall</span></a>!</p>
Brian Greenberg<p>The post-quantum era is closer than you think!</p><p>It’s time to tighten up that security hygiene and future-proof your organization’s data before quantum computing renders today’s encryption obsolete.</p><p>Here’s your crypto checklist:<br>🔐 Audit your encryption infrastructure<br>⚙️ Automate certificate/key management<br>🧠 Educate teams on quantum risk<br>🧪 Pilot NIST’s post-quantum algorithms<br>📅 Start now—retrofitting later will cost you</p><p>Quantum threats don’t wait. Neither should we.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/PostQuantum" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PostQuantum</span></a> <a href="https://infosec.exchange/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/ITOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITOps</span></a> <a href="https://infosec.exchange/tags/QuantumComputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QuantumComputing</span></a> <a href="https://infosec.exchange/tags/CyberResilience" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberResilience</span></a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/post-quantum-planning-security-hygiene" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/vulnerabilitie</span><span class="invisible">s-threats/post-quantum-planning-security-hygiene</span></a></p>
Pyrzout :vm:<p>Forward-thinking CISOs are shining a light on shadow IT <a href="https://www.helpnetsecurity.com/2025/04/04/curtis-simpson-armis-shadow-it-risks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/04/04</span><span class="invisible">/curtis-simpson-armis-shadow-it-risks/</span></a> <a href="https://social.skynetcloud.site/tags/Artificialintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Artificialintelligence</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/automation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>automation</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Features" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Features</span></a> <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/shadowIT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shadowIT</span></a> <a href="https://social.skynetcloud.site/tags/strategy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>strategy</span></a> <a href="https://social.skynetcloud.site/tags/Armis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Armis</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://social.skynetcloud.site/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a></p>
LMG Security<p>Are Encryption Backdoors Putting Your Organization at Risk? </p><p>In this clip, <span class="h-card" translate="no"><a href="https://infosec.exchange/@sherridavidoff" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sherridavidoff</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@MDurrin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>MDurrin</span></a></span> explain why encryption backdoors are a nightmare for organizations, creating security gaps that cybercriminals can exploit.<br>Watch this full episode of Cyberside Chats to hear Sherri and Matt break down Apple’s battle against the UK’s demands for backdoor access, the worldwide backlash, and what it all means for cybersecurity professionals. </p><p>We'll cover: <br>▪ Why backdoors are a double-edged sword for security<br>▪ Historical backdoor failures that left organizations exposed<br>▪ Pro tips to strengthen your security posture against evolving encryption policies</p><p>🎥 Watch the full video: <a href="https://youtu.be/5HhNKMIJkCQ" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/5HhNKMIJkCQ</span><span class="invisible"></span></a><br>🎧 Listen to the podcast: <a href="https://www.chatcyberside.com/e/the-encryption-battle-security-savior-or-cyber-risk/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">chatcyberside.com/e/the-encryp</span><span class="invisible">tion-battle-security-savior-or-cyber-risk/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://infosec.exchange/tags/Backdoors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backdoors</span></a> <a href="https://infosec.exchange/tags/AppleVsUK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppleVsUK</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSecurity</span></a> <a href="https://infosec.exchange/tags/CybersideChats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CybersideChats</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Riskmanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Riskmanagement</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/CIO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CIO</span></a></p>
Cambionn<p>Someone send the CISO Musical to me. I kinda want to see it, ngl. It's hilarious 🤣.</p><p><a href="https://mastodon.nl/tags/ciso" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ciso</span></a> <a href="https://mastodon.nl/tags/musical" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>musical</span></a> <a href="https://mastodon.nl/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> </p><p><a href="https://www.cisomusical.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">cisomusical.com/</span><span class="invisible"></span></a></p>
Discernible<p>New post: "The CISO's Communication Playbook"</p><p>Security isn't just technical—it's psychological. Learn how five evidence-based communication theories can transform your influence as a security leader.</p><p>Read the full article: <a href="https://discernibleinc.com/blog/ciso-communication-playbook" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discernibleinc.com/blog/ciso-c</span><span class="invisible">ommunication-playbook</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a>​​​​​​​​​​​​​​​​ <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/SecurityCommunications" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityCommunications</span></a></p>
stepcellwolf<p>I’m happy to share that I’ve obtained a new certification: Chief Information Security Officer <a href="https://mastodon.social/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> from PECB! <a href="https://www.credly.com/badges/bec6630f-9a06-4531-acbd-67602de9081b/linked_in?t=stu1fb" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">credly.com/badges/bec6630f-9a0</span><span class="invisible">6-4531-acbd-67602de9081b/linked_in?t=stu1fb</span></a></p>
mcdwayne<p>Securing state agencies isn’t easy. Josh Kuntz, CISO in the state of Texas, shares insights on public sector cyber, AI threats, and why patching is still king after 25 years. </p><p>🎧 <a href="https://youtu.be/dyUGYYrbqg4" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/dyUGYYrbqg4</span><span class="invisible"></span></a> </p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a></p>
Nerdfallmanagement<p>In der <a href="https://social.tchncs.de/tags/Stellenausschreibung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Stellenausschreibung</span></a> ist die Rede von „großzügiger <a href="https://social.tchncs.de/tags/Homeoffice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Homeoffice</span></a> Regelung“.<br>Ich frage nach, was das heißt. <br>„Nach einem halben Jahr Einarbeitung in Präsenz 50% Homeoffice, also 2 Tage“ sagt mir die Dame vom <a href="https://social.tchncs.de/tags/HR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HR</span></a> ganz stolz.</p><p>Okay Leute… hört einfach auf euch über <a href="https://social.tchncs.de/tags/Fachkr%C3%A4ftemangel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fachkräftemangel</span></a> zu beschweren. Glaubt ihr, irgendein <a href="https://social.tchncs.de/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://social.tchncs.de/tags/ISB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ISB</span></a> <a href="https://social.tchncs.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.tchncs.de/tags/Nerd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nerd</span></a> findet 50% großzügig? <a href="https://social.tchncs.de/tags/Stelle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Stelle</span></a> <a href="https://social.tchncs.de/tags/Job" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Job</span></a> <a href="https://social.tchncs.de/tags/Jobsuche" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jobsuche</span></a></p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>🧵 …ja und nein und vor allem ist es Marketing durch Angstmacherei. Quantenkomputer sind noch nicht wirklich einsetzbar obwohl es viele als solches gerne vermarkten.</p><p>»Quantenschlüssel aus der Sicht des CISO:<br>Quantentechnologien – ein Sicherheitsrisiko oder das Mittel der Wahl gegen Cyberangriffe? Warum, für wen und wo es wichtig ist, die Integration von Quantentechnologien zu starten.«</p><p>⚛️ <a href="https://www.csoonline.com/article/3846875/quantenschlussel-aus-der-sicht-des-ciso.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">csoonline.com/article/3846875/</span><span class="invisible">quantenschlussel-aus-der-sicht-des-ciso.html</span></a></p><p><a href="https://chaos.social/tags/quantencomputer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quantencomputer</span></a> <a href="https://chaos.social/tags/pqcrypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pqcrypto</span></a> <a href="https://chaos.social/tags/pqc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pqc</span></a> <a href="https://chaos.social/tags/ciso" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ciso</span></a> <a href="https://chaos.social/tags/computer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>computer</span></a> <a href="https://chaos.social/tags/komputer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>komputer</span></a> <a href="https://chaos.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://chaos.social/tags/it" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>it</span></a></p>
John Kristoff<p>"I will do all we can to enforce 100% OPSEC." - Pete Hegseth, March 14, 2025 in a Signal group chat to coordinate response plans to Houthis.</p><p>Group chat of 18 included JD Vance, Tulsi Gabbard, Marco Rubio, and... Jeffrey Goldberg (The Atlantic Editor-in-chief).</p><p>Every <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> moves up one.</p>
Discernible<p>💫 NEW CASE STUDY: How Discernible helped CISO Amy Bogac navigate executive communications and career transition</p><p>"Never did I ever think that I would need a personal incident response plan and public relations expert to help manage media inquiries or questions." —Amy Bogac, Baker Tilly CISO</p><p>Read how she secured a $1B+ organization CISO role: <a href="https://discernibleinc.com/blog/building-ciso-resilience-strategic-communications" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discernibleinc.com/blog/buildi</span><span class="invisible">ng-ciso-resilience-strategic-communications</span></a></p><p><a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/SecurityCommunications" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityCommunications</span></a></p>
Ian Barker<p>How the role of CISO is evolving [Q&amp;A] <a href="https://newsie.social/tags/QandA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QandA</span></a> <a href="https://newsie.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://newsie.social/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a></p><p><a href="https://betanews.com/2025/03/19/how-the-role-of-ciso-is-evolving-qa/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">betanews.com/2025/03/19/how-th</span><span class="invisible">e-role-of-ciso-is-evolving-qa/</span></a></p>
sͧb̴ͫƸ̴gͬᵉ<p><span class="h-card" translate="no"><a href="https://cyberplace.social/@GossiTheDog" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>GossiTheDog</span></a></span> <br>There comes a point in every <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a>:s life when they think ”Maybe, maybe I know enough of <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> to be able to very quietly earn a living on The Dark Side”.</p><p>This event is called The Point Of Recall.</p>
sͧb̴ͫƸ̴gͬᵉ<p>I have days as a <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> when I see five nines of every product being sold by the <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> industry as an absolute waste of resources, unless and until I have a team and org fully in place that knows what it wants to accomplish security-wise, and how. </p><p>We can <a href="https://infosec.exchange/tags/LOL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LOL</span></a> and <a href="https://infosec.exchange/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> it up until that point, and be better for it.</p><p>And then I have weekends.</p>
LMG Security<p>Abandoned S3 Buckets are a goldmine for hackers! </p><p>Last week, we shared new research revealing the alarming risks of abandoned S3 buckets. Now, cybersecurity experts <span class="h-card" translate="no"><a href="https://infosec.exchange/@sherridavidoff" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sherridavidoff</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@MDurrin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>MDurrin</span></a></span> share more details on this new threat and provide advice on how to reduce your risk from this attack tactic that can expose you to supply chain compromises and remote code execution attacks. </p><p>Read our latest blog to learn how to protect your organization: <a href="https://www.lmgsecurity.com/abandoned-s3-buckets-a-goldmine-for-hackers/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/abandoned-s3-b</span><span class="invisible">uckets-a-goldmine-for-hackers/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://infosec.exchange/tags/AbandonedS3Buckets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AbandonedS3Buckets</span></a> <a href="https://infosec.exchange/tags/S3Buckets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>S3Buckets</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/CloudComputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudComputing</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/Databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Databreach</span></a></p>
Ian Barker<p>Why are virtual CISOs becoming so popular? Because organizations need them [Q&amp;A] <a href="https://newsie.social/tags/QandA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QandA</span></a> <a href="https://newsie.social/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://newsie.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p><p><a href="https://betanews.com/2025/02/21/why-are-virtual-cisos-becoming-so-popular-because-organizations-need-them-qa/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">betanews.com/2025/02/21/why-ar</span><span class="invisible">e-virtual-cisos-becoming-so-popular-because-organizations-need-them-qa/</span></a></p>
LMG Security<p>Are Your Web Apps an Open Door for Hackers?</p><p>Imagine spending months perfecting your web app, only to find it leaking data like a sieve. Scary, right? That’s exactly what happens when common security flaws go unchecked.</p><p>In LMG Security’s latest blog, <span class="h-card" translate="no"><a href="https://infosec.exchange/@tompohl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tompohl</span></a></span> shares jaw-dropping real-world web application security attack case studies from the field, including:</p><p>▪ Command Injection Jackpot – A hidden file upload flaw led to full server control.<br>▪ API Admin Takeover – An overlooked endpoint allowed attackers to create Super Admin accounts.<br>▪ Heap Dump Disaster – A debugging tool exposed Active Directory credentials and user tokens<br>.<br>Read the full blog to learn how hackers target web apps and how to lock them down: <a href="https://www.lmgsecurity.com/common-web-application-security-attacks-real-world-lessons-from-the-field/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/common-web-app</span><span class="invisible">lication-security-attacks-real-world-lessons-from-the-field/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsecurity</span></a> <br><a href="https://infosec.exchange/tags/WebAppSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebAppSecurity</span></a> <a href="https://infosec.exchange/tags/APISecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APISecurity</span></a> <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenTesting</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/WebApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebApp</span></a> <a href="https://infosec.exchange/tags/WebApplication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebApplication</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/penetrationtesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>penetrationtesting</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a></p>