Jeremiah GrossmanOvjeren akaunt

@jeremiahg

CEO (Bit Discovery | ), Professional Hacker, Black Belt in Brazilian Jiu-Jitsu, Founded WhiteHat Security, and Maui, Hi resident.

Maui, Hi
Vrijeme pridruživanja: ožujak 2008.

Tweetovi

Blokirali ste korisnika/cu @jeremiahg

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jeremiahg

  1. Prikvačeni tweet

    Are we secure yet?

    Prikaži ovu nit
    Poništi
  2. Pervasive facial recognition + target advertising = Minority Report advertising scene. How many years before this 'innovation' becomes our new reality?

    Poništi
  3. Be passive. Be aggressive. Just don’t be passive aggressive. Pick a side!

    Poništi
  4. You know at some point soon there is a gonna be a new Hollywood movie title, “The ‘Cyber' Negotiator.” “All the world’s data is encrypted…"

    Poništi
  5. proslijedio/la je Tweet
    30. sij

    Insurance company was hit by ransomware but it was insured so its insurer negotiated the fee and paid the criminals. Decryption tool the criminals provided worked. But the insurer now wants the money back from the criminals. Some customers are never satisfied.

    Poništi
  6. Congratulations Richard! A BJJ BLUE BELT! A huge accomplishment and milestone. Hope to see ya again at BH in vegas for the 10yr smackdown anniversary!

    Poništi
  7. This is why we predominately see Bug Bounty successfully deployed against the more mature (aka secure) organizations these days. /6

    Prikaži ovu nit
    Poništi
  8. If priced right, there is point where the Bug Bounty model become more economically advantageous. A customer is able to model roughly how many vulns are expected to be found and going market rate for the crowd to look for them. /5

    Prikaži ovu nit
    Poništi
  9. This is because the pricing model is essentially based on paying for 'effort' not 'performance.’ Over time there comes a point economically where they are comparatively very few vulns left to be found, and it makes more sense to pay for ‘performance’ (ie reported vulns). /4

    Prikaži ovu nit
    Poništi
  10. In year 2, we'd expect the InfoSec program to mature and the number of reported vulns to decrease (less to be found), but the VA product licensing cost remains largely fixed. Consequently, the dollars-per-vuln metric actually inceases! Rinse repeat in year 3, 4, etc. /3

    Prikaži ovu nit
    Poništi
  11. When customers license a VA product, it's typically an annual price. In newer InfoSec programs these tools will likely find A LOT of vulns. In year 1, if you divide the license cost by the number of vulns found over during the year, you get a dollars-per-vuln metric. /2

    Prikaži ovu nit
    Poništi
  12. Many years ago I came to the conclusion that in many scenarios the "Bug Bounty" model was economically superior to the typical pricing model of VA vendors, especially as security programs mature. This is how I reasoned though it. /1

    Prikaži ovu nit
    Poništi
  13. I wonder how many other security vendors, anti-virus or otherwise, are selling customer data similar to Avast. I mean, they can’t be the only ones in the industry can they?

    Poništi
  14. Not to mention it’s incredibly rare for a breach to occur due to a vulnerability that a scanner failed to identify, or was incapable of finding.

    Prikaži ovu nit
    Poništi
  15. Before setting out to build a ‘better’ vulnerability scanner, consider for a moment that a customer has never said, “It’d be awesome if my scanner found 10% more vulns in my network.”

    Prikaži ovu nit
    Poništi
  16. In geo-politics, it feels like hacking has largely replaced dumpster diving.

    Poništi
  17. Poništi
  18. When someone says they can do something, I believe them. When someone says they can’t do something, I believe them. That might be the only times I automatically believe anything without evidence.

    Poništi
  19. On the other hand, even if the loss numbers are true, it would not appear that such a breach was an existential threat to the business. And as been discussed earlier, a breach can represent a buy-low-sell-high opportunity. Think about that.

    Prikaži ovu nit
    Poništi
  20. Remember the Equifax breach? Recent reports estimated their collective losses at ~$1.4B to as high as ~$2B. In real terms, I don’t believe the figures will be anywhere near that, and neither do investors. Why? Look at the 1yr chart. Trading at a 52 week high!

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    22. sij

    The entire team at is very very happy to be joining . U've heard me defend cyberinsurance for a while, it was time I put my money where my mouth is.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·