this post was submitted on 20 Nov 2024
10 points (91.7% liked)

cybersecurity

3284 readers
27 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 1 year ago
MODERATORS
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

top 7 comments
sorted by: hot top controversial new old
[–] PaddleMaster@beehaw.org 1 points 1 day ago

Schedule slips of capability installs, and fighting fake status updates. Oh joy! Nothing like having a vendor report that something is working and delivered and it’s completely missing. But somehow, it meets requirements, so contractually, they’re good.

[–] boatswain@infosec.pub 2 points 1 day ago

Trying to make the time to review all this SOC 2 evidence for our annual audit, while also getting pinged for tons of other issues all the time.

[–] stinky@redlemmy.com 4 points 2 days ago (1 children)

I live with an abuser and just getting out of bed is a monumental struggle

[–] m0unt4ine3r@programming.dev 1 points 20 hours ago

Your post doesn't indicate your level of opsec, the country you live in, or your abuser's technical understanding of computing machinery and security. Something important to be aware of (if you're not already) is depending on where you're posting from and what your abuser has access to, a post like yours--or following any of the links below--without taking appropriate precautions could put you in (further) danger.

The first thing that should be established (if you don't already have one) is a threat model--consider things like: what are your abuser's capabilities? (what do they know?, what can they access?, etc); what do you want to keep from them? (ie your online activities, especially as they relate to getting out of your situation if that is your goal); what controls/defenses can you use to keep yourself safe, prevent info discovery, mitigate harm, etc? How you can safely proceed depends on your threat model, which depends on your own unique circumstances.

Here are a few links, but please proceed carefully (if you don't want to follow them for safety reasons, feel free to ask questions here):

If the above is not the type of response you were seeking (or you were already aware of it all), feel free to disregard it. (I understand at least some of the potential implications of this post being in a cybersecurity community on a cybersecurity Lemmy instance, but I didn't want to assume just in case.) Regardless, I hear you. Your situation sounds awful. (If you just wanted to effectively shout into the void for some type of release, feel free to ignore this entire response. Finally, just in case anyone is wondering: the reason I replied here instead of privately is in the case resources/info are desired, others can provide better links/info and/or correct anything that's wrong/dubious--I'm just a computer nerd with questionable social skills who wasn't sure if/how to respond 😅...)

[–] scytale@lemm.ee 4 points 2 days ago

Reviewing for a GIAC certification exam next week. It’s a beta exam so my score will help dictate the passing score when it officially comes out next year.

[–] Omgboom@lemmy.zip 3 points 2 days ago (1 children)

I'm in service account password rotation hell

[–] catloaf@lemm.ee 1 points 2 days ago

If this is AD, have you looked at gMSAs at all?