Todd Thiemann
banner
cryptodd.bsky.social
Todd Thiemann
@cryptodd.bsky.social
930 followers 2.4K following 280 posts
California native, Omdia (formerly Enterprise Strategy Group) analyst, cybersecurity geek, soccer goalkeeping phenom. Crypto = cryptography, Views=mine, Reposts≠endorsement
Posts Media Videos Starter Packs
Pinned
The Enterprise Strategy Group (ESG) Starter Pack so you can keep up with the ESG analyst team covering #cybersecurity and all thinks enterprise information technology. go.bsky.app/4axSvJz
A magnificent Sunday on the California coast (Point Lobos State Park). Autumn is the best time to see the coast in northern California - not so much fog.
TechCrunch Disrupt 2025 was exceptional event!
Thanks to everyone who made this year's San Francisco event what it was -- and to the 10,000 of you who filled the halls, made the connections, and left with more than you came with. Couldn't make it? These images tell part of the story.
Scenes from TechCrunch Disrupt | TechCrunch
Thanks to everyone who made this year's San Francisco event what it was -- and to the 10,000 of you who filled the halls, made the connections, and left with more than you came with. Couldn't make it? These images tell part of the story.
techcrunch.com
Reposted by Todd Thiemann
In case you haven't had enough cyber for one day...

I'm re-upping my deep-dive blog on why ad-blockers are critical for your online security and privacy, and what threats they can help defend against. Plus, I run through some of the best ad blockers out there, for your browser and beyond.
Why ad blockers are a top security and privacy defense for everyone
Ad blockers can help defend against some of the top hacks, scams, and surveillance today. Here are some of the best ad blockers that you can use.
this.weekinsecurity.com
I think one phrase is "privatize the benefit, socialize the risk."
This could privatize the profits and socialize the risk if they are not careful. And I suspect they are not careful. #quantumcomputing #pqc
Security for Agentic AI is complicated with multiple layers to consider -data (DSPM, DLP), prompt injection attacks, and identity (authentication and authorization). And probably more. And it depends on context (SaaS, on prem, cloud).
Reposted by Todd Thiemann
Good morning! ☀️ There's still time to sign up for today's edition of my newsletter this.weekinsecurity.com, which has all of the cyber news you need to know (and more) from the past seven days. It's a really busy one!

Sign up (or RSS) for the free weekly newsletter, or $10/month for blogs & more.
~this week in security~
a weekly cybersecurity newsletter by Zack Whittaker, plus articles and more.
this.weekinsecurity.com
Reposted by Todd Thiemann
EW: 🇰🇵DPRK has begun hiding malware on blockchain.

Result, decentralized, immutable malware.

Nearly impossible to remove.

cloud.google.com/blog/topics/...
Congrats on the inclusion. Next time, preface the post with "Spoiler Alert!" so I can shut my eyes and scroll past.
Lots of cryptography and cybersecurity geeks like me can geek out. It is/was a beautiful puzzle.
Reposted by Todd Thiemann
California's fire season has not seen many big fires materialize, and this storm may signal the end of the fire season for 2025 - www.nytimes.com/2025/10/13/w...
Early-Season Storm Sends a Deluge of Rain to California
www.nytimes.com
Reposted by Todd Thiemann
‼️ The @cyberwarcon.bsky.social agenda and presenters list is live. Proud that Amazon Cyber Threat Intelligence will be presenting for the first time on the intersection of Iranian cyber ops and kinetic strikes with Dlshad Othman and @davidmagnotti.bsky.social! www.cyberwarcon.com/ping-first-b...
Ping First, Boom Second — CYBERWARCON
www.cyberwarcon.com
New Blog Alert! Omdia/Enterprise Strategy Group published new research on workforce identity security (AKA identity & access management), and this blog dives into the challenge of tool proliferation. Identity teams have an average of 11 discrete tools to juggle - www.techtarget.com/searchsecuri...
Identity security tool sprawl: Origins and the way forward | TechTarget
Identity security teams face tool sprawl with an average of 11 products. Read research insights on consolidation strategies and emerging platform approaches.
www.techtarget.com
Reposted by Todd Thiemann
Bonkers Palo Alto Login Scanner activity has continued through the weekend. We coordinated with/Palo on Fri, so they know aboot it & have the backs of their customers.

tzulo, inc. & 3xK Tech GmbH continue to be the primary network sources (both need a spanking/null route).

viz.greynoise.io/tag...
Reposted by Todd Thiemann
Oracle E-Business Suite: Security Alert Advisory
URL: www.oracle.com/security-ale...
Classification: Critical, Solution: Official Fix, Exploit Maturity: High, CVSSv3.1: 9.8
www.oracle.com
The Sun-Times editor may not know their guns - they got it wrong.