"We get pentested so we're secure"
Why the annual pentest is a snapshot with no predictive value, how the industry puts junior testers on template reports, and what a good pentest actually is.
20 paginas
Why the annual pentest is a snapshot with no predictive value, how the industry puts junior testers on template reports, and what a good pentest actually is.
How the term "zero-day" was hijacked by marketing, why most "zero-day attacks" are actually n-day attacks, and who profits from the confusion.
Why TSA screening and security awareness training are the same problem, how decades of ritual have failed to stop the core attack, and what we learn from that.
How Cl0p in 2023 emptied thousands of organisations over one weekend via a file-transfer tool nobody had ever inspected — and why supply chain attacks aren't going away.
On legacy systems, industrial controllers that never reboot, vendors who went bankrupt five years ago, and what to do when 'just patch it' isn't an option.
How 100 million Capital One customers were looted by an ex-AWS employee with an SSRF exploit, why the cloud isn't security, and what your people don't want to hear.
On the annual mandatory training everybody clicks through, the gotcha simulations that shame colleagues, and why the research says you're not training people to become defenders.
Why Hollywood gives you the wrong picture of insider threats, why the real threat is almost always boring and sloppy, and what offboarding has to do with security.
On the absurdity of terabytes of logs that nobody ever looks at, the shock of discovering they aren't there, and how to build a logging strategy people will actually use.
How an 18-year-old in September 2022 brought down the entire Uber empire in 24 hours by calling an employee until they pressed approve.
What cyber insurance does and doesn't do, why it keeps getting more expensive and harder to get, and the painful question of whether you should even want it.
How in the spring of 2024 a hundred large companies were emptied via a service they used every day — and why the vendor could technically claim it wasn't their fault.
How an industry of 200-question forms created an illusion of control, and what to do instead if you actually want to know whether your vendor is any good.
On Friday 19 July 2024, 8.5 million Windows machines collapsed simultaneously. It wasn't an attack. It was an update. And it's exactly what modern IT rests on.
What NIS2 actually requires, what consultants are selling you, and the difference between those two — explained without a single PowerPoint.
How a password manager with 33 million customers lost everything its name is literally about — and what that says about your trust in vendors.
Half of organisations don't know whether their backups work — and most find out on the day it matters.
Why you don't need to worry about Russian APT groups and very much should worry about the 14-year-old with a phishing kit he bought on Discord.
How an organisation can pass ISO 27001, sign NIS2, and still be flattened six weeks later by a teenager with a phishing kit.
Password rotation is a fifteen-year-old superstition. Here's why it survives, why it never worked, and what to do this afternoon.