Introduction
Introduction Statistics Contact Development Disclaimer Help
Post ASDQV8PbT9DZESQzdg by [email protected]
More posts by [email protected]
Post #ASDENzkc4dLmtR5gDA by [email protected]
0 likes, 0 repeats
@SecurityWriter So, can we call this a Compliance Service Attack?
Post #ASDGNMl7FDeds19aRU by [email protected]
0 likes, 0 repeats
@SecurityWriter The model I liked best so far was decentralised procurement, bu…
Post #ASDGVXEMC9hWfEj5Gq by [email protected]
0 likes, 0 repeats
@SecurityWriter "The service desk is now aware" is the start to MANY …
Post #ASDGhM2fcSt9RFtbJw by [email protected]
0 likes, 0 repeats
@SecurityWriter I enjoy a good rubberneck but I have to confess I haven’t rea…
Post #ASDGhNYxxsJg9i0uIa by [email protected]
0 likes, 0 repeats
@ottocrat @SecurityWriterImagine if your work gave you milk. It's magic mi…
Post #ASDGhNdZgk0EO0AaTw by [email protected]
0 likes, 0 repeats
@Name_Too_Long Heheh, thanks… I think! So they hired this IT service company …
Post #ASDGhNmn8TNKqaTwqe by [email protected]
0 likes, 0 repeats
@SecurityWriter @Name_Too_Long Oh hell 😱 Surely this kind of thing must happ…
Post #ASDGhNvIcqBHGySk6q by [email protected]
0 likes, 0 repeats
@SecurityWriter @ottocrat And you rarely get to see it from a safe distance.Usu…
Post #ASDGj2JbvyEapucbAG by [email protected]
0 likes, 0 repeats
@SecurityWriter That...seems potentially unreasonable?
Post #ASDGmHCp1nEbt3zVzM by [email protected]
0 likes, 0 repeats
@SecurityWriter is it a university? I’ll bet it’s a university.
Post #ASDGqsTgOT40dt4VKy by [email protected]
0 likes, 0 repeats
@SecurityWriter I think fremd-schämen is appropriate.
Post #ASDGz6DLCp1bYtLefg by [email protected]
0 likes, 0 repeats
@SecurityWriter can you share of an example of something that would make a mach…
Post #ASDGz7BFc4wmYhNV3I by [email protected]
0 likes, 0 repeats
@elliot @SecurityWriter As I read it, the problem was the hardware was no longe…
Post #ASDGz7K7582J0BWZrk by [email protected]
0 likes, 0 repeats
@SecurityWriter thanks. that's what I suspected. I guess I hadn't heard…
Post #ASDHAnhXrUy3cW3VuC by [email protected]
0 likes, 0 repeats
@SecurityWriter More or less like someone does something which makes you feel e…
Post #ASDM7pWP8YukATFPOq by [email protected]
0 likes, 0 repeats
@SecurityWriter wow decentralised IT procurement to org unit cost code without …
Post #ASDMTb91GuM3wsgnNQ by [email protected]
0 likes, 0 repeats
@SecurityWriter please reassure me it was only a forced unjoin, no wiping or de…
Post #ASDMTbIahK0kQZARIO by [email protected]
0 likes, 0 repeats
@SecurityWriter msft makes Authenticator managed and I hate it as I gave my own…
Post #ASDMTbQkD0X6pqyx0K by [email protected]
0 likes, 0 repeats
@SecurityWriter Authy doesn't allow export of seed codes, to ensure you are…
Post #ASDP84wu4u8VsTS7KS by [email protected]
0 likes, 0 repeats
@SecurityWriter A lesson I was taught by a wise old soak senior support enginee…
Post #ASDPz0a13Lw3ftzBJI by [email protected]
0 likes, 0 repeats
@SecurityWriter I got half way through this journey before my break ended. If y…
Post #ASDQV8PbT9DZESQzdg by [email protected]
0 likes, 0 repeats
@SecurityWriter https://youtu.be/3_TD9bgCrSo
Post #ASDQlbYQszwOFVPxeS by [email protected]
0 likes, 0 repeats
@SecurityWriter I still sometimes take my idea of an anonymous site publishing …
Post #ASDYFMb5lBb6E8naDI by [email protected]
0 likes, 0 repeats
@SecurityWriter Engage "Per our project plan and previous discussions&quot…
Post #ASDlrPEpgixMpHrENk by [email protected]
0 likes, 0 repeats
@SecurityWriter this thread is GOLD
Post #ASEG1jjRLSqHuI13NA by [email protected]
0 likes, 0 repeats
@SecurityWriter i guess that malicious compliance on this scale should be revie…
Post #ASEOWJAAybVM7Ebt5M by [email protected]
0 likes, 0 repeats
@SecurityWriter Love this whole thread, thanks for sharing.Communication at sca…
Post #ASEdWyLxKcqtB0tXqy by [email protected]
0 likes, 0 repeats
@SecurityWriter sometimes you just gotta let the client client.
Post #ASEylMXyH5GJIuDZiq by [email protected]
0 likes, 0 repeats
@SecurityWriter The hardest thing about infosec is promises and expectations me…
Post #ASILrNARlEv3Nzvff6 by [email protected]
0 likes, 0 repeats
@SecurityWriter this was a great read. Would have been a great share during my …
Post #ASRB9DgiOUQY7oy9zs by [email protected]
0 likes, 0 repeats
@SecurityWriter “Devolved acquisition is often lauded as a dynamic and forwar…
Post #ASRE2P3A3G9hCPuRnc by [email protected]
0 likes, 0 repeats
@SecurityWriterThank you, indeed, I have witnessed procurement at large organiz…
Post #ASTituDMIbzo8w1kZs by [email protected]
0 likes, 0 repeats
@SecurityWriter so in the end, #LackOfAccountability & #LackOfConsequences …
Post #ASTiu0doPAim4iRxdw by [email protected]
0 likes, 0 repeats
@SecurityWriter @kkarhan "Try as you might you can never make something id…
Post #ASkFcjPzaklikjiJto by [email protected]
0 likes, 0 repeats
@SecurityWriter haha, all this and nobody thought to tell service desk 🤣🤣…
Post #ASkFcjVJGz1R1ECZBg by [email protected]
0 likes, 0 repeats
@SecurityWriter the worst part is this is a scenario which could plausibly unfo…
Post #ASkGY3iemlQIDnmPPU by [email protected]
0 likes, 0 repeats
@SecurityWriter oh I mean the entire thing 🤣 to the letter
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.