Scarcity and Abundance in 2025
I mean, what stage of the S curve is this? It’s been a tough week for the AI haters; not only because of Ghibli Day (if you aren’t in the loop, congratulations for touching grass, but also open any…
AI is no longer scarce—but most orgs still think like it is. Alex Danco’s latest unpacks what shifts when code becomes labor, not capital. Great read on ops, value creation & the future of “heavy” vs “light” companies:
31.03.2025 13:59 — 👍 0 🔁 0 💬 0 📌 0
The Startup Drake Equation
Why do smart, driven founders fail, despite having great ideas and execution? This model offers an answer, and a path to increase the chance of success.
Why do so many cybersecurity startups fail? It’s not just execution—it’s misreading the game.
🔹 Find a niche or get crushed.
🔹 Tech ≠ Success: CISOs buy risk reduction, not features.
🔹 Adapt fast or fall behind.
Good discussion here:
10.03.2025 13:59 — 👍 0 🔁 0 💬 0 📌 0
Adversarial Misuse of Generative AI | Google Cloud Blog
We share our findings on government-backed and information operations threat actor use of the Gemini web application.
New report from Google combines cyber intel & Gemini in order to show how adversaries are using GenAI. The results are not too surprising— productivity, research, & similar— but interesting to see regardless:
03.03.2025 14:59 — 👍 0 🔁 0 💬 0 📌 0
“Oh, this one? Crazy ending. He’s Luke’s father?? wtf. Blew my mind” — or other similar spoilers…
07.02.2025 02:09 — 👍 1 🔁 0 💬 0 📌 0
Almost 10% Of South Korea's Workforce Is Now A Robot
The country had 1,012 robots per 10,000 employees, topping the global list, according to a new survey.
🤖 Robots now make up ~10% of South Korea's labor force:
Understanding automation density by comparing robotic "workers" to the human workforce is a good first step, but it will be interesting to see a comparison of tasks vs. resources/budget.
14.12.2024 18:43 — 👍 0 🔁 0 💬 0 📌 0
LLMs Raise Efficiency, Productivity of Security Teams
AI-powered tools are making cybersecurity tasks easier to solve, as well as easier for the team to handle.
Now that more enterprises have embraced AI, security teams are… benefitting?
Turns out, productivity is universal as we explore how to apply this technology. Of all the statistics I’m impressed by, seeing an improvement in incident response due to AI is perhaps the most promising of all…
12.12.2024 19:36 — 👍 0 🔁 0 💬 0 📌 0
Trust Issues - Schneier on Security
This essay appeared as a response in Boston Review‘s forum, “The AI We Deserve.” For a technology that seems startling in its modernity, AI sure has a long history. Google Translate, OpenAI chatbots,…
Trust is the entire reason our industry exists— and Schneier, as always, does a great job of breaking down this concept and hits to the heart of where AI needs to improve: we need to be able to trust the models and technology.
11.12.2024 14:59 — 👍 1 🔁 0 💬 0 📌 1
Why SOC Roles Need to Evolve to Attract a New Generation
The cybersecurity industry faces a growing crisis in attracting and retaining SOC analysts.
One of the few use cases for current generation AI is pattern recognition. What better place to use that then in your SOC, where Tier I analysts are bombarded by thousands false-positives and poor processes for resolution?
10.12.2024 19:36 — 👍 0 🔁 0 💬 0 📌 0
Navigating the Changing Cybersecurity Regulations Landscape
The evolving regulatory environment presents both challenges and opportunities for businesses.
At last year’s SANS ICS Summit, I held a workshop on cybersecurity regulations over the years. And 2025 is going to be unprecedented.
Pay attention to the trends and prepare your contingency plans (including budgets) for the various requirements you may need to add to your program in the future.
09.12.2024 14:59 — 👍 0 🔁 0 💬 0 📌 0
AT&T to kill off landline phone service for most people by 2029
But several states are putting up a fight.
..the clock is ticking for my utility friends still using dial up to avoid additional NERC CIP requirements. If you’ve not been convinced yet, it soon won’t matter as more and more landline capabilities are being replaced.
08.12.2024 22:17 — 👍 0 🔁 0 💬 0 📌 0
8 Tips for Hiring Neurodivergent Talent
Neurodivergent talent can add so much to a cybersecurity team. How can companies ensure they have the right hiring and onboarding practices in place to help these employees succeed?
I’ve spoken at conferences on why we need more diversity — of background, thought, and experiences— in cybersecurity. Over the years, I’ve helped grow teams and individuals alike.
The practices in this article give a good starting point for leaders looking to cultivate better neurodivergent talent:
03.12.2024 19:36 — 👍 0 🔁 0 💬 0 📌 0
Phishing-as-a-Service Rockstar 2FA continues to be prevalent
Phishing tool Rockstar 2FA targets Microsoft 365 credentials, it uses adversary-in-the-middle (AitM) attacks to bypass 2FA.
“Identity is the new firewall” is the best way to describe a CISO’s focus in 2025.
One example? The evolution of Phishing-as-a-Service — and the more recent surge in certain kits, like Rockstar 2FA to bypass MFA controls:
02.12.2024 14:59 — 👍 0 🔁 0 💬 0 📌 0
AI Alone Isn’t Ready for Chip Design
A combination of classical search and machine learning may be the way forward
Great technical breakdown on using AI in chip design from IEEE. For me, this highlights why use cases are not enough. Can AI “do the thing?” Maybe. But the -how- and the -feasibility- always needs to be explored more.
26.11.2024 19:36 — 👍 1 🔁 0 💬 0 📌 0
'PDF to Brainrot' Is Certainly One Way to Study
Online learning sites are making PDF to brainrot generators that use current slang and brainrot style videos to help kids study. Do these things work? Do they help kids learn? I tested four popular…
I’ve been calling it our slow descent into Idiocracy, but apparently the more apt term is now “brainrot.”
As an instructor dedicated to teaching technical topics, I embrace any methodology students need to study.
…On the other hand..
25.11.2024 17:16 — 👍 0 🔁 0 💬 0 📌 0
Comic of a person standing outside a building labeled “ICS Security” showing it off to a new person while proclaiming “this is my favorite community!” Slowly, a drunk person emerges from the building talking nonsense about securing sensors. Embarrassment ensues.
Just in case new folks here haven’t followed me on other social platforms… I don’t want to give the impression that this account will be all serious stuff.
If you want that, follow my LinkedIn.
If you want free range, small batch, extremely niche memes… then I’ve got you covered..
24.11.2024 22:04 — 👍 2 🔁 0 💬 0 📌 0
Hello, world!
24.11.2024 19:23 — 👍 3 🔁 0 💬 1 📌 0
The latest news from Wall St. to Silicon Valley. Informative, witty, and everything you need to start your day. ☕️
🔗 : https://www.morningbrew.com/daily
computer security person. former helpdesk.
Geopolitics, Russia, China, Cyber
Chairman @silverado.org
Author of WorldOnTheBrink.com
Host GeopoliticsDecanted.com podcast
Founder Alperovitch Institute for Cybersecurity Studies at Johns Hopkins SAIS
Co-Founder CrowdStrike
@DAlperovitch elsewhere
Cyber news reporter, hockey player, always learning about cyber, languages, life.
Not an AI (yet). Speaker-Author-Advisor. Climate & Cyber & GenAI & Kinetic physical critical infrastructure & crown jewel protector. Diversity seeker & promoter. A Bostonian in Wisconsin. MKE/IDA/DCA/BOS
Hacker of the inevitability curves of life.
Cyber and Physical Security Manager. Technology Monitoring. Instructor @ Arizona State. Baseball fan.
Oklahoma City
Digital security, smoked meats, welding, and running. No_filter. Opinions are my own and not a reflection of any organization I may (or may not) be part of. Likes, re-posts, and follows do not constitute endorsement.
The ICS Advisory Project is an open-source project that provides Critical Infrastructure Security Agency (CISA) ICS Advisory data in CSV format and supports multiple interactive dashboards for OT/ICS Asset Owners' vulnerability management.
Security Awareness Advocate, Knowster, CISSP, (ISC)2 CFL President, Professor, #80, photographer
ICS/OT cybersecurity - defending critical infrastructure from assholes who seek to disrupt and cause harm. Community builder and HOU.SEC.CON cofounder
The human network. Recovering information sharers. No coin or alcohol needed. Just bring your awesome self.
Electric Power Geek, Hardhat Hacker, Control System Security Engineer, & .... Opinions are my own. (ಠ_ಠ) c[_] KC3GST
Goat herder
Lost theoretical astrophysicist (someday)
Cat Wrangler
Philosopher-Strategist-Protector… more later