Ryan McGeehan

@Magoo

Focused on risk measurement and security teams that can handle incidents. Writes "Starting Up Security". Former Facebook and Coinbase. Follow !

Vrijeme pridruživanja: ožujak 2009.

Tweetovi

Blokirali ste korisnika/cu @Magoo

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Magoo

  1. Prikvačeni tweet
    13. sij

    I hope to write more effectively in 2020. I'd love your 👍 or 👎 feedback. (Form is anon). Thanks! ❤️

    Poništi
  2. proslijedio/la je Tweet
    prije 12 sati

    It’s hiring day! It’s hiring day! Latacora builds security teams for startups. We work exclusively with startups and long-term; clients stay with us for about a year, during which we work full-time on appsec, corpsec, and secops, after which we help hire our replacements.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    22. sij

    I just published a ~45 page whitepaper on attacking and defending terraform infrastructure as code in GitHub. Includes attack scenarios, hardening, detections, etc. Deep thanks to and for their inspiration and research. ❤️ 1/3

    Prikaži ovu nit
    Poništi
  4. 15. sij

    Gonna keep writing about 3. Someone has to. Will try to steer more towards 1 & 2 and keep the quant nonsense out of it. :)

    Prikaži ovu nit
    Poništi
  5. 15. sij

    Current takeaways: 1. Write more about soft security stuff (Some feedback) 2. Write more about organizational stuff (Nearly all feedback) 3. Forecasting and Risk ("oh god please stop")

    Prikaži ovu nit
    Poništi
  6. 11. sij

    They were also making calls to retail locations and SE'ing them in order to impersonate them as well. Were you able to discover any authentication methods that customer service would accept from their own retail locations looking to help customers?

    Prikaži ovu nit
    Poništi
  7. 11. sij

    Great effort and reading through it now. One observation I was able to get during incident response of a SIM swap victim was that the adversary made ~70+ calls to customer service agents before they ultimately succeeded w/ a sim swap.

    Prikaži ovu nit
    Poništi
  8. 11. sij

    This is worth looking through if you're interested in account takeover / cellular fraud. Princeton researchers: - Enumerated how to SIM swap five telco's by way of cust. service. - Reviewed how SMS is used to recover accounts across the internet.

    Poništi
  9. proslijedio/la je Tweet

    New by me: Pulse Secure VPN flaw being used to deliver targeted ransomware to large organisations

    Prikaži ovu nit
    Poništi
  10. 2. sij

    Long story short, we have not seen any of our listed events that would confirm "The Big Hack". The panel expected any one of these could occur if the claims were confirmed. The 22 person panel forecasted with ~55% certainty that these events wouldn't happen. (Brier: ~0.4017)

    Prikaži ovu nit
    Poništi
  11. 2. sij

    That's here, for anyone who wants to start from the beginning:

    Prikaži ovu nit
    Poništi
  12. 2. sij

    Wrote a quick retrospective for the Bloomberg forecast some of us put together in late 2018.

    Prikaži ovu nit
    Poništi
  13. 9. pro 2019.

    Classifying types of Security Work: Applying "types of work" from The Phoenix Project to security engineering

    Poništi
  14. 2. pro 2019.

    A risk based security project 📢: Driving an awareness project with a risk measurement ethos.

    Poništi
  15. proslijedio/la je Tweet
    19. stu 2019.

    From the blog: Add defense in depth against open firewalls, reverse proxies, and SSRF vulnerabilities with enhancements to the EC2 Instance Metadata Service

    Poništi
  16. proslijedio/la je Tweet
    19. stu 2019.

    This is a truly exciting day, 3 years in the making! We are open sourcing Nebula, the global overlay networking tool we use to connect every computer at . I hope you enjoy reading about (and using!) Nebula.

    Poništi
  17. proslijedio/la je Tweet
    6. stu 2019.

    DOJ charges two former Twitter employees for allegedly using their insider access to spy for Saudi Arabia. The likely activity reported previously, but charges are new

    Prikaži ovu nit
    Poništi
  18. 5. stu 2019.

    Wildly diverse and different risk measurement approaches using similar language ("In The Wild" / Time) and producing compatible, competing values is absolutely what our industry needs. I am very, very excited to see this.

    Prikaži ovu nit
    Poništi
  19. 5. stu 2019.

    The group I worked produced shorter term forecasts: "Will BlueKeep be exploited before August?" with a forecast of ~72%. This groups method put a 12 month forecast window around 95.2%. Highly validating to see another group independently take this approach.

    Prikaži ovu nit
    Poništi
  20. 5. stu 2019.

    I'm very excited. I found other folks measuring risks publicly. You can compare their approach to measuring BlueKeep's imminent exploit-ability with my approach. Both output very similar risk measurements.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·