I *occasionally* worry that we focus on threats which pattern-match to hacking in movies as opposed to things which an actual attacker would use, like “spearphish publicly routable employees.”
-
-
Show this thread
-
There’s a business model here, incidentally, on product client software, server software, and peripherals to guarantee this isn’t happening. “Alerts your security team every time a USB device that has not been blessed is inserted” is a reasonable posture at some places.
Show this thread
End of conversation
New conversation -
-
-
Amen.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.