Rob Dickinson's Avatar

Rob Dickinson

@robfromboulder.bsky.social

Software philosopher, security & big-data nerd, enthusiastically bad drummer. VP of Engineering at @graylog.bsky.social. Based in Boulder CO ๐Ÿ”๏ธ ๐Ÿ‡บ๐Ÿ‡ธ #api #apisecurity #cybersecurity #infosec

241 Followers  |  501 Following  |  12 Posts  |  Joined: 15.11.2024  |  1.7096

Latest posts by robfromboulder.bsky.social on Bluesky

So much of โ€œprompt engineeringโ€ is what we used to just call โ€œbeing a good managerโ€ and you might not really grok that without having managed a midsize team at some point in your career

05.08.2025 20:48 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

I believe my marketing/events team would recognize this as my writing process

09.04.2025 02:36 โ€” ๐Ÿ‘ 6    ๐Ÿ” 1    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Preview
apidays New York 2025 - API Management for Surfing the Next Innovation Waves: GenAI and Open Banking | May 14 & 15, 2025 May 14 & 15, 2025 - API Management for Surfing the Next Innovation Waves: GenAI and Open Banking | AI's potential hinges on effective API management. Apidays NYC explores this critical connection, sho...

We're going to #apidays NYC! ๐ŸŽ‰ Our VP of Eng.,
@robfromboulder.bsky.social, will be speaking there, as well. ๐Ÿ—ฃ๏ธ

See us in NYC May 14-15 to talk #APIsecurity, #SIEM, & more. Or just to hang & get #Graylog swag! ๐Ÿค๐ŸŽ

www.apidays.global/new-york/ #APIs #cybersecurity #API #APIdaysNY #Graylog

12.03.2025 21:48 โ€” ๐Ÿ‘ 0    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Why API Discovery Is Critical to Security API discovery is critical to an organization's security posture because shadow and deprecated APIs are unmanaged risks that attackers can take advantage of.

Unmanaged #APIs create #security blindspots. ๐Ÿ•ถ๏ธ ๐Ÿ˜ง And, as orgs build out their application ecosystems, the number of APIs integrated into IT environments expands โ€” which can easily overwhelm security teams. โ†•๏ธ ๐Ÿ‘€ ๐Ÿ˜ต

Enter... API discovery.๐Ÿ’ฅ Learn more.๐Ÿ‘‡

graylog.org/post/why-api... #cybersecurity

04.03.2025 22:39 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Table 1: Top 15 Routinely Exploited Vulnerabilities in 2023

- SQL injection
- Code injection
- Command injection

19.02.2025 16:01 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Fact: ORMs aren't a magic bullet for SQL injection. Misusing the API or vulnerabilities in the library itself can still cause problems.

I've seen it already with TypeORM and with Sequelize.

11.02.2025 10:01 โ€” ๐Ÿ‘ 7    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
How To Approach API Security Amid Increasing Automated Attack Sophistication In 2025, security teams must prioritize API monitoring, threat detection, and protection against both automated and traditional attacks to safeguard sensitive data.

#APIsecurity incidents were at an all time high in 2024. ๐Ÿ™€

With increasing #cyberattacks driven by #AI & automation, #security teams must have a strategy that emphasizes monitoring firewalls, gateways, etc. but also works towards detecting API data exfiltration.

www.itprotoday.com/vulnerabilit...

11.02.2025 21:17 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

omg ๐Ÿคฆ๐Ÿปโ€โ™‚๏ธ

10.02.2025 18:13 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

The obvious question is whether this would actually be enforcedโ€ฆbut imho establishing a federal standard of care for privacy is worth it either way

06.02.2025 18:04 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Syslog Protocol: A Reference Guide Follow this guide Syslog Protocol: A Reference Guide and you will have enough information to understand the differences and nuances of Syslog.

Need a reference guide for the Syslog protocol? ๐Ÿ“‘ We've got you covered! ๐Ÿ™Œ

#Syslog is a logging protocol that is supported across many applications as well as hardware, and despite having been developed in the 1980s is still a very common format in use today. graylog.org/post/syslog-... #cybersec

04.02.2025 01:52 โ€” ๐Ÿ‘ 5    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Watch and wait and enjoy sports and hope that a national moment of realization obtains, gotcha

03.02.2025 22:20 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Just today have seen multiple phishing attempts offering โ€œhelpโ€ accessing frozen government funds and benefits

03.02.2025 19:48 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

This is a really big deal about protecting critical infrastructure.

If any adversary takes down your water supply, you got a problem.

#CyberCivilDefense #take9

27.01.2025 20:03 โ€” ๐Ÿ‘ 12    ๐Ÿ” 5    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

Everyday we're all for-real under threat of cyber attacks, that's seriously scary.

Good news is thereโ€™s something we can all do to thwart these dangers.

Here's a start: just pause and #Take9 seconds before you click, download, or share.

Follow @pausetake9 for more!

#CyberCivilDefense

27.01.2025 16:32 โ€” ๐Ÿ‘ 34    ๐Ÿ” 12    ๐Ÿ’ฌ 4    ๐Ÿ“Œ 0
Preview
Using Data Pipelines for Security Telemetry Data pipelines automate the collection, transformation, and delivery processes to make data usable for analytics and visualization.

Not all orgs need heavy-hitting data pipeline management tools.๐Ÿ‹โ€ Complex tools create extra work & require more skills. Simple ones won't give you the data you need. You need the โ€œjust rightโ€ tool.

Learn more about data pipelines & their benefits for security telemetry. graylog.org/post/using-d...

24.01.2025 21:20 โ€” ๐Ÿ‘ 8    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
CISA director says threat hunters spotted Salt Typhoon on federal networks before telco compromises A top federal cybersecurity official said that threat hunters from CISA first discovered activity from Salt Typhoon on federal networks.

CISA director says threat hunters spotted Salt Typhoon on federal networks before telco compromises

19.01.2025 21:42 โ€” ๐Ÿ‘ 6    ๐Ÿ” 6    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image 17.01.2025 20:07 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image Post image Post image Post image

It's been an awesome few days at the #Graylog company-wide get together in Charleston, SC. ๐ŸŽ‰ One highlight was our awards ceremony where we honored some particularly impactful team members.๐Ÿ‘

Congrats on some amazing achievements & TY for being such great roll models! ๐Ÿ† #cybersecurity #infosec

17.01.2025 03:13 โ€” ๐Ÿ‘ 3    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Biden signs 11th-hour cybersecurity executive order Ransomware, AI, secure software, digital IDs โ€“ there's something for everyone in the presidential directive

Is Biden's 11th-hour EO on cybersecurity DOA?

"Given the timing right before a change in the administration, I can't help but think it's a bit of a Hail Mary designed to include everything possible and just see what sticks."

17.01.2025 20:33 โ€” ๐Ÿ‘ 5    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Why Patching Isnโ€™t the Ultimate Goal in Cybersecurity Patching critical systems is always the fix for eliminating vulnerabilities. Or Is it? A focus on what matters and the priorities is best.

Hi #infosec, I wrote a blog about patching prioritization. CVE scores weren't meant to be the gold standard. Context from your runtime activity is an essential ingredient. And for those systems that cant/wont be patched, you need monitoring in place. graylog.org/post/why-pat...

08.01.2025 18:03 โ€” ๐Ÿ‘ 3    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
These are the cybersecurity stories we were jealous of in 2024 | TechCrunch The very best work from our friends at competing publications.

I love the annual tradition of @lorenzofb.bsky.social @zackwhittaker.bsky.social and @carlypage.bsky.social highlighting the best cybersecurity stories (and, in quite a few cases, thorough investigations) that other people wrote techcrunch.com/2024/12/24/t...

24.12.2024 18:59 โ€” ๐Ÿ‘ 21    ๐Ÿ” 10    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1

It's truly amazing we've reached the level of cybersecurity where China has hacked so many US telecom companies that the US government is now recommending the general public uses end-to-end encrypted messaging (something they spent the last 10+ years trying to ban "because terrorism").

19.12.2024 00:04 โ€” ๐Ÿ‘ 475    ๐Ÿ” 115    ๐Ÿ’ฌ 11    ๐Ÿ“Œ 3
Preview
What is an API attack and how does it work To protect your organization from an API attack, you should know what APIs are and how threat actors use them to steal data.

Let's talk about #APIsecurity. As orgs integrate more applications, they add more #APIs, making API #security both more important and more challenging. ๐Ÿ‘€

Do you need help with API security? We've got you covered! Learn more.๐Ÿ‘‡

graylog.org/post/what-is... #cybersecurity #infosec

17.12.2024 23:00 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Due to U.S. telco networks being compromised, today CISA is recommending:
1. Use only end-to-end encrypted communications
2. Enable Fast Identity Online (FIDO) phishing-resistant authentication
3. Migrate away from SMS-based MFA
4. Use a password manager to store all passwords

18.12.2024 17:59 โ€” ๐Ÿ‘ 29    ๐Ÿ” 14    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 1
Virtual view hiearchies with Trino
YouTube video by Trino Virtual view hiearchies with Trino

The video from my Trino Summit talk on virtual views is now available: youtu.be/z8eh_3vBpvg

18.12.2024 21:05 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Runbooks need to be copy-and-paste, not read-and-interpret

16.12.2024 19:15 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

This is for real, US telecom companies already working to clean up compromised systems.

The speaker is Jen Easterly, who's very much the real deal.

#CyberCivilDefense

15.12.2024 15:27 โ€” ๐Ÿ‘ 30    ๐Ÿ” 11    ๐Ÿ’ฌ 3    ๐Ÿ“Œ 0

API calls are a native tongue for bad bots. For all of the legit fear around AIs attacking online businesses and infrastructure, there isn't enough acknowledgment that APIs are an obvious entry point for those malicious AIs. #apisecurity #cybersecurity

12.12.2024 20:12 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@robfromboulder is following 19 prominent accounts