Kathryn Renaud
@krenaud1.bsky.social
12 followers
5 following
34 posts
Cybersecurity analyst with a curiosity for AI and philosophy.
Building safer systems by day, exploring human systems by night.
💻 Security | 🌱 AI Hobbyist | 🧠 UPE Tech Chair | 👾 Gamer | 💬 Chronic Overthinker
Posts
Media
Videos
Starter Packs
The timelines in this CISA directive to patch F5 vulnerabilities are not grounded in the relative risk posed. The required remediation timelines have been artificially extended to ensure there's a possibility for compliance given staff impacted by the shutdowns.
www.cisa.gov/news-events/...
www.cisa.gov/news-events/...
ED 26-01: Mitigate Vulnerabilities in F5 Devices | CISA
Section 3553(h) of title 44, U.S. Code, authorizes the Secretary of Homeland Security, in response to a known or reasonably suspected information security
www.cisa.gov
Kathryn Renaud
@krenaud1.bsky.social
· Sep 29
The Puppet Masters of Cybersecurity
The Puppet Masters of Cybersecurity Opening On the surface, every business likes to believe it is running the show with the spotlight firmly on its own stage. But look closer and you will see the stri...
www.linkedin.com
Kathryn Renaud
@krenaud1.bsky.social
· Sep 27
The Wedding Crashers of Cybersecurity - Genea Fertility Clinic Breach
Fun Analogy Picture a wedding in full swing. Music drifts across the hall, candles glow on every table, and the bride and groom move from guest to guest with that kind of joy that only comes once.
www.linkedin.com
Kathryn Renaud
@krenaud1.bsky.social
· Sep 13
I'm a 28-year-old Gen Zer who bought an apartment in NYC. It was easier than I expected.
Like many other Gen Z homeowners, I bought my NYC apartment as a single buyer. Affordability is a major issue for Gen Z, but here's how I handled it.
www.businessinsider.com
Kathryn Renaud
@krenaud1.bsky.social
· Sep 12
Salt Typhoon Attacks Jaguar: The Breach That Governance Could Have Prevented
The Breach that Stopped Jaguar When Salt Typhoon infiltrated Jaguar’s network, it didn’t use a zero-day exploit or cutting-edge malware. Instead, the breach occurred through a few forgotten vendor acc...
www.linkedin.com
Kathryn Renaud
@krenaud1.bsky.social
· Aug 30
Collateral Breaches: The Ripple Effect of Nation-State Hacking
Abstract Nation-state cyber campaigns rarely stop at their declared targets. When groups like Salt Typhoon exploit critical infrastructure, the immediate headlines focus on which governments or corpor...
www.linkedin.com
Kathryn Renaud
@krenaud1.bsky.social
· Aug 16
Kathryn Renaud
@krenaud1.bsky.social
· Aug 14