Brian Lewis
@brian.totallyoutnumbered.com
Cybersecurity + Creativity
—
NACD.DC (National Association of Certified Directors)
—
Non-Profit Executive and Founder
—
Cancer survivor (prospective)
—
NACD.DC (National Association of Certified Directors)
—
Non-Profit Executive and Founder
—
Cancer survivor (prospective)
Reposted by Brian Lewis
I've been putting off sending a professional email since July because I've dreaded the response.
I sent it today, and received a reply of "no worries that's fine" in about three minutes.
I will learn nothing from this.
I sent it today, and received a reply of "no worries that's fine" in about three minutes.
I will learn nothing from this.
December 4, 2024 at 8:28 PM
I've been putting off sending a professional email since July because I've dreaded the response.
I sent it today, and received a reply of "no worries that's fine" in about three minutes.
I will learn nothing from this.
I sent it today, and received a reply of "no worries that's fine" in about three minutes.
I will learn nothing from this.
Reposted by Brian Lewis
At JPL they do amazing things, many of them one offs. How should we think about the risk of a unique event? Note that this isn’t a coin flip, where we can measure across many events, and use those flips to test our theories. Consider the Sky Crane. As my guide described to me, it’s the least […]
Original post on infosec.exchange
infosec.exchange
December 4, 2024 at 4:55 PM
At JPL they do amazing things, many of them one offs. How should we think about the risk of a unique event? Note that this isn’t a coin flip, where we can measure across many events, and use those flips to test our theories. Consider the Sky Crane. As my guide described to me, it’s the least […]
Reposted by Brian Lewis
I'm pleased to release our latest whitepaper, Understanding the Four Question Framework for Threat Modeling! It’s free as part of our Black Friday sale, and uhhh, because we like sharing knowledge it’ll remain free.
shostack.org/whitepapers/...
shostack.org/whitepapers/...
Threat Modeling Whitepapers from Shostack + Associates
shostack.org
November 27, 2024 at 6:40 PM
I'm pleased to release our latest whitepaper, Understanding the Four Question Framework for Threat Modeling! It’s free as part of our Black Friday sale, and uhhh, because we like sharing knowledge it’ll remain free.
shostack.org/whitepapers/...
shostack.org/whitepapers/...
Reposted by Brian Lewis
New blog/whitepaper release:
Shostack + Associates is pleased to release our latest whitepaper, Understanding the Four Question Framework for Threat Modeling! It’s free as part of our Black Friday sale, and uhhh, because we like sharing knowledge it’ll […]
[Original post on infosec.exchange]
Shostack + Associates is pleased to release our latest whitepaper, Understanding the Four Question Framework for Threat Modeling! It’s free as part of our Black Friday sale, and uhhh, because we like sharing knowledge it’ll […]
[Original post on infosec.exchange]
November 27, 2024 at 6:53 PM
New blog/whitepaper release:
Shostack + Associates is pleased to release our latest whitepaper, Understanding the Four Question Framework for Threat Modeling! It’s free as part of our Black Friday sale, and uhhh, because we like sharing knowledge it’ll […]
[Original post on infosec.exchange]
Shostack + Associates is pleased to release our latest whitepaper, Understanding the Four Question Framework for Threat Modeling! It’s free as part of our Black Friday sale, and uhhh, because we like sharing knowledge it’ll […]
[Original post on infosec.exchange]
Reposted by Brian Lewis
What are some accessible Infosec & Opsec resources that activists, journalists, and organizers can turn to in preparation for the Trump admin?
Preparing for a fascist regime can feel scary and paralyzing. This seems like an area where people can take control w/ concrete steps.
Please share below 👇🏽
Preparing for a fascist regime can feel scary and paralyzing. This seems like an area where people can take control w/ concrete steps.
Please share below 👇🏽
November 25, 2024 at 9:57 PM
What are some accessible Infosec & Opsec resources that activists, journalists, and organizers can turn to in preparation for the Trump admin?
Preparing for a fascist regime can feel scary and paralyzing. This seems like an area where people can take control w/ concrete steps.
Please share below 👇🏽
Preparing for a fascist regime can feel scary and paralyzing. This seems like an area where people can take control w/ concrete steps.
Please share below 👇🏽
Reposted by Brian Lewis
For Threat Model Thursday, let’s look at Threat Modeling with ATT&CK from MITRE. As always with Threat Model Thursday, my goal is to respectfully engage with interesting work and ask what we can learn from it. This one is particularly interesting because […]
[Original post on infosec.exchange]
[Original post on infosec.exchange]
October 17, 2024 at 3:17 PM
For Threat Model Thursday, let’s look at Threat Modeling with ATT&CK from MITRE. As always with Threat Model Thursday, my goal is to respectfully engage with interesting work and ask what we can learn from it. This one is particularly interesting because […]
[Original post on infosec.exchange]
[Original post on infosec.exchange]
Reposted by Brian Lewis
Most security teams are treating LLMs like any other API endpoint.
But these models introduce unique risks that traditional security controls weren't designed to handle.
This GenAI threat modeling guide from AWS can be of great help:
aws.amazon.com/blogs/securi...
But these models introduce unique risks that traditional security controls weren't designed to handle.
This GenAI threat modeling guide from AWS can be of great help:
aws.amazon.com/blogs/securi...
Threat modeling your generative AI workload to evaluate security risk | Amazon Web Services
As generative AI models become increasingly integrated into business applications, it’s crucial to evaluate the potential security risks they introduce. At AWS re:Invent 2023, we presented on this top...
aws.amazon.com
November 19, 2024 at 10:17 PM
Most security teams are treating LLMs like any other API endpoint.
But these models introduce unique risks that traditional security controls weren't designed to handle.
This GenAI threat modeling guide from AWS can be of great help:
aws.amazon.com/blogs/securi...
But these models introduce unique risks that traditional security controls weren't designed to handle.
This GenAI threat modeling guide from AWS can be of great help:
aws.amazon.com/blogs/securi...