Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile
Security Unfiltered Podcast

@secunfpodcast

Cyber Security can be a difficult field to not only understand but to also navigate. Joe is here to help with over 7 years of experience.

ID: 1398785085093126149

linkhttps://securityunfiltered.buzzsprout.com calendar_today29-05-2021 23:35:49

1,1K Tweet

1,1K Takipçi

4,4K Takip Edilen

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

Identity is the structural high ground—it sees everything. Mishandling identity correlates to 80%+ of security incidents. This isn't just a theory; it's a topical observation from breach data. #Cybersecurity #IdentityTheft

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

Traditional TLS doesn't fully protect credentials. They live across multiple third parties. What if credentials didn't have to move? Modern electronics have HSMs, enabling asymmetric authentication where private keys can't move. #cybersecurity #authentication

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

Cybersecurity isn't about firewalls anymore—it's all about identity. Hackers are bypassing complex defenses with simple help desk calls. In a world of internet-only access, identity is your strongest overlay. #Cybersecurity #IdentityTheft

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

Most security incidents are identity problems. Identity is the future of security, preventing forest fires, not just putting them out. Critical infrastructure is getting serious about plugging holes. #CyberSecurity #Identity #InfraSec

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

What if credentials *couldn't* be stolen? Modern electronics have built-in HSMs that guarantee signing keys can't move. This shrinks the attack surface and makes credential theft obsolete. #Cybersecurity #Authentication

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

Zero trust security using HSMs and post-quantum encryption might be more doable than experts initially thought. Turns out, leveraging existing modules can offer robust protection. #ZeroTrust #CyberSecurity

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

Bank of America's cloud security budget? $1.5 billion. When a breach exposes mortgages, SSNs, addresses, and entire identity histories, the cost of security becomes irrelevant. #CloudSecurity #Cybersecurity

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

Bank of America's cloud security budget? $1.5 billion. Why? Identity is the new perimeter. Control plane, device-bound creds—it's all about knowing the security of the device itself. #CloudSecurity #Identity #ZeroTrust

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

At a successful IPO, the receptionist made almost $2M. If the receptionist can become successful, everyone at the company can be. Not all startups get these outcomes, but doing it right can work for everyone. #StartupSuccess #Equity

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

Growing up in a house of engineers sparked an early interest in tinkering and building. From taking apart toys to robotics competitions, that curiosity led to startups and entrepreneurship out of necessity—and ultimately, freedom. #Engineering #Startups

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

Cyber warfare capabilities are like "digital nukes." Shutting down a country's water supply or power grid could be as devastating as a nuclear attack—potentially killing even more people. #CyberWarfare #NationalSecurity

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

Cyber warfare is like playing 4D chess, with potential consequences as devastating as a nuke. Are governments prepared for the offensive shift, or are we leaving ourselves vulnerable? #CyberSecurity #CyberWarfare

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

The hardest part of cyber warfare? Getting someone to actually launch the exploit before it's patched. Zero-days have a short window of opportunity before they become useless. #Cybersecurity #ZeroDay

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

Cybersecurity keeps you on your toes. It's a field where constant learning is key. Bridging the gap between policymakers and the fast-evolving world of cyber is where the real impact happens. #Cybersecurity #Tech #Innovation

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

A cyber warfare officer at the NSA said that, in over 200 missions, he has *never* encountered a target he couldn't hack—regardless of location or security. #CyberSecurity #Privacy

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

A new national cyber strategy is coming. For any government to say, "We're gonna secure it all," isn't realistic without investing in the private sector. #Cybersecurity #NationalSecurity

Security Unfiltered Podcast (@secunfpodcast) 's Twitter Profile Photo

States are enlisting cybersecurity experts into cyber commands, a smart move given the US's size and infrastructure limitations. The EU's Cyber Reserve offers similar rapid incident response. #Cybersecurity #CyberCommand