@owendylan.bsky.social
CISO @Nightwing soccer fanatic. Views/opinions are my own
The top security leadership role is often misunderstood by executives, board members, and even cyber teams in ways that significantly impacts organizational sec…

www.csoonline.com/article/3846...
7 misconceptions about the CISO role
The top security leadership role is often misunderstood by executives, board members, and even cyber teams in ways that significantly impacts organizational security and risk.
www.csoonline.com
March 23, 2025 at 11:37 PM
Google’s Firebase platform also hosted configuration settings used by the apps.

arstechnica.com/security/202...
Android apps laced with North Korean spyware found in Google Play
Google’s Firebase platform also hosted configuration settings used by the apps.
arstechnica.com
March 13, 2025 at 1:25 AM
Reposted
Brilliant and brave take from @rgblights.bsky.social explaining the outsized impact of firing probationary employees in the cybersecurity talent pipeline. breakingdefense.com/2025/03/ex-n...
Ex-NSA cyber chief warns of 'devastating impact' of potential DOGE-inspired firings - Breaking Defense
"Eliminating probationary employees will destroy a pipeline of top talent essential for hunting and eradicating [People's Republic of China] threats,” Rob Joyce, former director of cybersecurity at th...
breakingdefense.com
March 6, 2025 at 12:40 AM
Terms of What?
tl;dr
medium.com
March 6, 2025 at 1:15 AM
North Korean hackers took just two minutes to make off with $1.5bn (£1.2bn) in cryptocurrency, cyber security researchers believe, in the single biggest heist i…

www.yahoo.com/news/north-k...
North Korean hackers ‘took just two minutes’ to pull off record $1.5bn heist
North Korean hackers took just two minutes to make off with $1.5bn (£1.2bn) in cryptocurrency, cyber security researchers believe, in the single biggest heist in history.
www.yahoo.com
March 1, 2025 at 1:39 AM
www.inversecos.com/2025/02/an-i...
They have a name for us!!😂 😂 😂
An inside look at NSA (Equation Group) TTPs from China’s lense
www.inversecos.com
February 21, 2025 at 12:35 AM
Trusted PDFs turn toxic as smaller screens face bigger risk

www.techradar.com/pro/security...
Millions at risk as malicious PDF files designed to steal your data are flooding SMS inboxes - how to stay safe
Trusted PDFs turn toxic as smaller screens face bigger risk
www.techradar.com
February 5, 2025 at 4:52 AM
February 3, 2025 at 1:07 AM
The US Cybersecurity and Infrastructure Security Agency (CISA) is warning that Contec CMS8000 devices, a widely used healthcare patient monitoring device, inclu…

www.bleepingcomputer.com/news/securit...
Backdoor found in two healthcare patient monitors, linked to IP in China
The US Cybersecurity and Infrastructure Security Agency (CISA) is warning that Contec CMS8000 devices, a widely used healthcare patient monitoring device, include a backdoor that quietly sends patient...
www.bleepingcomputer.com
January 31, 2025 at 2:54 AM
Reposted
I think the most common misunderstanding of Conditional Access is its relationship to authentication, and this results in not understanding how the rest of the controls actually work

Conditional Access performs authorization by evaluating tokens from the authentication service
January 24, 2025 at 11:12 PM