Profile avatar
owendylan.bsky.social
CISO @Nightwing soccer fanatic. Views/opinions are my own
120 posts 56 followers 243 following
Prolific Poster

therecord.media/volt-typhoon...

www.wired.com/story/inside...

Google’s Firebase platform also hosted configuration settings used by the apps. arstechnica.com/security/202...

blogs.infoblox.com/threat-intel... Dangling participles and dangling DNS records are both bad...

Brilliant and brave take from @rgblights.bsky.social explaining the outsized impact of firing probationary employees in the cybersecurity talent pipeline. breakingdefense.com/2025/03/ex-n...

medium.com/@Sniffler/te... Interesting read

North Korean hackers took just two minutes to make off with $1.5bn (£1.2bn) in cryptocurrency, cyber security researchers believe, in the single biggest heist i… www.yahoo.com/news/north-k...

therecord.media/hegseth-orde... Shameful...

krebsonsecurity.com/2025/02/trum...

www.theatlantic.com/politics/arc...

www.inversecos.com/2025/02/an-i... They have a name for us!!😂 😂 😂

krebsonsecurity.com/2025/02/how-...

www.wired.com/story/russia...

www.newsweek.com/chinese-spy-...

foreignpolicy.com/2025/02/11/d... This is a good read.

www.cybersecuritydive.com/news/trump-n... I guess there wasn't an experienced cyber person available??

www.eff.org/deeplinks/20...

www.justice.gov/opa/pr/justi...

Trusted PDFs turn toxic as smaller screens face bigger risk www.techradar.com/pro/security...

labs.jumpsec.com/tokensmith-b...

The US Cybersecurity and Infrastructure Security Agency (CISA) is warning that Contec CMS8000 devices, a widely used healthcare patient monitoring device, inclu… www.bleepingcomputer.com/news/securit...

www.theverge.com/2025/1/24/24...

I think the most common misunderstanding of Conditional Access is its relationship to authentication, and this results in not understanding how the rest of the controls actually work Conditional Access performs authorization by evaluating tokens from the authentication service

Location tracking is putting you at risk—this is what you need to do now. www.forbes.com/sites/zakdof...

therecord.media/texas-sues-a... Well this could be fun!!😂 😂 😂

For one listing, rent jumped nearly 86% since September. In an interview with LAist, the agent said she told her client, “People are desperate, and you can probably get good money.” via @laist.com

Some thoughts on Zero Trust and the OMB mandate www.cybersecurityintelligence.com/blog/looking...

www.npr.org/2025/01/08/n...

Happy New Year!!😂 😂 😂 cloud.google.com/blog/topics/...

Someone recently asked me what's the point of having two or three buttons on a tailored jacket if the bottom-most button isn't meant to be fastened? It's easier to understand style if you think of it in terms of social language, not purely as function. Let me give you some examples. 🧵

US edtech giant PowerSchool says hackers compromised the personal data of students and teachers after breaching its customer support portal. PowerSchool's software is used by over 16,000 customers to support more than 50 million students techcrunch.com/2025/01/08/e...

In 2020, Donald Trump pardoned a cybersecurity company executive for a secret crime. Unsealed court documents show why he was convicted. www.aol.com/cybersecurit...

krebsonsecurity.com/2024/12/u-s-...

www.wired.com/story/us-tre...

Rob Joyce explains how it's done www.theregister.com/AMP/2024/12/...

Source: CNN www.cnn.com/2024/12/20/t...

Security executives applaud Amazon for publicly shaming Microsoft security, although some suspect that it is a thinly veiled AWS sales pitch. www.csoonline.com/article/3625...