Security Engineer
425 subscribers
89 photos
1 video
47 links
A diary of Security Engineerโ€˜s life. The good, the bad, the secure ๐Ÿ˜ฌ

Ping for cooperation @stansecure

My LinkedIn linkedin.com/in/stansecure/
Download Telegram
Hey, everyone! Quick security reality check:

Have you ever checked if your email address has been part of a data breach? You might be shocked by the results people often find on sites like HaveIBeenPwned.com.

Scary thought? ๐ŸŽƒ

It's more common than you'd imagine. But the good news is there are two simple steps you can take right now to level up your security:

1. Use Unique Passwords (with a Password Manager)
โ€ข Why? Reusing passwords means attackers could access your other accounts if one account is breached.
โ€ข ๐‡๐จ๐ฐ? A reliable password manager (e.g., LastPass, 1Password) can generate and store super-strong passwords, so you never reuse one again!

2. ๐„๐ง๐š๐›๐ฅ๐ž ๐Œ๐ฎ๐ฅ๐ญ๐ข-๐…๐š๐œ๐ญ๐จ๐ซ ๐€๐ฎ๐ญ๐ก๐ž๐ง๐ญ๐ข๐œ๐š๐ญ๐ข๐จ๐ง (๐Œ๐…๐€/๐Ÿ๐…๐€)
โ€ข ๐–๐ก๐ฒ? Even a strong password can be exposed in a breach. MFA adds an extra hurdle for attackers.
โ€ข ๐‡๐จ๐ฐ? Turn on MFA wherever possible. Use SMS or an authenticator app (Google Authenticator, Authy, Duo, etc.). Many are free and keep you secure even if your password leaks.

โ–ถ๏ธ ๐“๐š๐ค๐ž ๐€๐œ๐ญ๐ข๐จ๐ง: Check your email with HaveIBeenPwned.com and lock down any exposed accounts. It's better to be safe than sorry!

๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง: What is your biggest hurdle to adopting password managers or MFA?

React or comment below! ๐Ÿ‘‡

#CyberSecurity #Security #DataSecurity #Privacy

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
1๐Ÿ‘6๐Ÿ‘Ž1
Just wrapped up experimenting with image-generating AIโ€ฆ
This is what a โ€œCloud & SaaS Security Proโ€ action figure might look like ๐Ÿ”๐Ÿง‘โ€๐Ÿ’ป

Honestly? This is the cleanest version I could get with the tools I used ๐Ÿ˜…

๐Ÿ‘‰ What AI tools are you using to create visuals like these? Would love to explore whatโ€™s working for others.

Drop your favorite image or design tools below! ๐Ÿ‘‡

#AI #AIGenerated #PromptEngineering

@securediary
๐Ÿ‘4๐Ÿ‘Ž1
Balancing WAF security with user experience is a constant tradeoff.
Too strict? False positives block real users.
Too loose? Vulnerabilities slip through.

๐Ÿ”’ Pro Tip for WAF Tuning:

1. Start in alert mode โ€” observe traffic before enforcing.
2. Review logs, tune detection rules, and whitelist safe APIs.
3. Iterate weekly: adjust โžค test โžค repeat.

WAF should protect quietly โ€” users stay happy๐Ÿ™ƒ, attackers stay out.

How do you fine-tune your WAF without affecting conversions?
Letโ€™s share best practices๐Ÿ‘‡

#CyberSecurity #WAF #AppSec

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘2โค1๐Ÿ‘Ž1
๐Ÿ”’ The Cookie Problem โ€” how to balance good UX and privacy in a cookieless world?

Third-party cookies are dying. But one thing hasn't changed:

1. Great UX needs personalization
2. Strong privacy limits tracking
3. Businesses still need insights to grow

From a cybersecurity lens, here's what I've learned:
๐—ง๐—ฟ๐—ฎ๐—ป๐˜€๐—ฝ๐—ฎ๐—ฟ๐—ฒ๐—ป๐—ฐ๐˜† + ๐˜ƒ๐—ฎ๐—น๐˜‚๐—ฒ ๐—ฒ๐˜…๐—ฐ๐—ต๐—ฎ๐—ป๐—ด๐—ฒ wins.

When people *๐™ ๐™ฃ๐™ค๐™ฌ* what data you're collecting โ€” and actually *๐™œ๐™š๐™ฉ ๐™จ๐™ค๐™ข๐™š๐™ฉ๐™๐™ž๐™ฃ๐™œ ๐™ช๐™จ๐™š๐™›๐™ช๐™ก* in return โ€” they're way more likely to say "yes."

Tools like #Cookiebot and #DataGuard make this simpler.

๐Ÿ™ƒHonestly, we still figuring out "the right" balance. But when people feel in control of their data, everything flows better โ€” trust, engagement, even results.

Your turn: How are you tackling this? Got a go-to approach (or challenge) worth sharing? ๐Ÿ‘‡

#GDPR #DataPrivacy #Privacy

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘7๐Ÿ‘Ž1
๐Ÿคฏ ๐—ช๐—ต๐—ฒ๐—ฟ๐—ฒ ๐˜„๐—ถ๐—น๐—น ๐˜๐—ต๐—ฒ ๐˜„๐—ผ๐—ฟ๐—น๐—ฑ'๐˜€ ๐˜๐—ผ๐—ฝ ๐—ฐ๐˜†๐—ฏ๐—ฒ๐—ฟ ๐—ฟ๐—ฒ๐˜€๐—ถ๐—น๐—ถ๐—ฒ๐—ป๐—ฐ๐—ฒ ๐—ถ๐—ป๐˜€๐—ถ๐—ด๐—ต๐˜๐˜€ ๐—ฏ๐—ฒ ๐˜€๐—ต๐—ฎ๐—ฟ๐—ฒ๐—ฑ ๐˜๐—ผ๐—บ๐—ผ๐—ฟ๐—ฟ๐—ผ๐˜„, ๐— ๐—ฎ๐˜† ๐Ÿฒ๐˜๐—ต? InfoSec Ukraine 2025 โ€“ and I'll be there!

This is your chance to dive deep into Ukraine's battle-tested defense strategies โ€“ from a country repelling over ๐Ÿฐ,๐Ÿฏ๐Ÿญ๐Ÿฑ ๐—ฐ๐˜†๐—ฏ๐—ฒ๐—ฟ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€ ๐˜†๐—ฒ๐—ฎ๐—ฟ๐—น๐˜†. If you're serious about security innovation, you can't afford to miss this.

Big thanks to Mary Hanzhelo for making my attendance possible!

๐Ÿ”ฅMust-see panel: "๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜„๐—ฎ๐—ฟ๐—ณ๐—ฎ๐—ฟ๐—ฒ ๐—ถ๐—ป ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ: ๐—ง๐—ต๐—ฒ ๐—˜๐˜…๐—ฝ๐—ฒ๐—ฟ๐—ถ๐—ฒ๐—ป๐—ฐ๐—ฒ ๐—ผ๐—ณ ๐—จ๐—ธ๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ฎ๐—ป ๐—–๐—ผ๐—บ๐—ฝ๐—ฎ๐—ป๐—ถ๐—ฒ๐˜€", May 6, 16:40โ€“17:20

๐ŸŽ™ Featuring top industry experts: โ–ซ๏ธArtem Skrypnyk โ–ซ๏ธMaksim Yashchyenkoโ–ซ๏ธDr. Oleh Polihenko โ–ซ๏ธVladimir Pokatilovโ–ซ๏ธOleh Matata

Who else is attending? Drop a comment or DM me.

Let's connect, exchange insights, and strengthen our collective defense!

๐ŸŽซ Final spots available โ†’ https://infosec.parkovy.tech/

#CyberSecurity #CyberResilience #Cyberwarfare

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘6
InfoSec Ukraine 2025 wasn't just another conference for me โ€” it was a reality check. As someone who spends my days defending networks, seeing experts break down the latest threats felt like looking into the future.

๐™ƒ๐™š๐™ง๐™š ๐™–๐™ง๐™š 5 ๐™†๐™š๐™ฎ ๐™„๐™ฃ๐™จ๐™ž๐™œ๐™๐™ฉ๐™จ ๐™ฉ๐™๐™–๐™ฉ ๐™ฉ๐™ง๐™ช๐™ก๐™ฎ ๐™จ๐™ฉ๐™ง๐™ช๐™˜๐™  ๐™ข๐™š.

1. ๐˜ผ๐™„ ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ (Bruce Schneier): The AI revolution is here, and with it comes massive risks.
* Key areas: Protecting AI systems, ensuring output integrity, and upcoming AI regulation.
* ๐Ÿค” My take: I'm particularly fascinated by how we'll balance innovation and strict regulatory compliance. That's the real challenge ahead!

2. ๐˜ผ๐™‹๐™ ๐™‚๐™ง๐™ค๐™ช๐™ฅ๐™จ (Serhii Khariuk): APTs now operate like professional software companies! Complete with developers, QAs, PMs, and even "sales" teams.
* ๐Ÿคฏ My take: Understanding their organizational structure is crucial for anticipating their strategies. We're not just dealing with lone hackers anymore.

3. ๐™๐™๐™š ๐™†๐™ฃ๐™ค๐™ฌ๐™ก๐™š๐™™๐™œ๐™š ๐™‚๐™–๐™ฅ (Nazar Tymoshyk Eduard Chornyi Serhii Khariuk Ilya Aksyonenko): Both offensive and defensive teams struggle to keep pace with the rapid evolution of threats and defenses.
* โšก๏ธ My take: Whoever invests in team training today wins tomorrow.

4. ๐™๐™๐™š ๐™Œ๐™ช๐™–๐™ฃ๐™ฉ๐™ช๐™ข ๐™‡๐™š๐™–๐™ฅ (Jaya Baloo): Her session on quantum computing's impact on cryptography was a wake-up call. Preparing for a post-quantum era should have started yesterday.
* โฑ My take: What we consider "secure" today will be broken tomorrow. And not in 10 years โ€” much sooner.

5. ๐™๐™ ๐™ง๐™–๐™ž๐™ฃ๐™ž๐™–๐™ฃ ๐˜พ๐™ค๐™ข๐™ฅ๐™–๐™ฃ๐™ž๐™š๐™จ' ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™ฌ๐™–๐™ง๐™›๐™–๐™ง๐™š ๐™€๐™ญ๐™ฅ๐™š๐™ง๐™ž๐™š๐™ฃ๐™˜๐™š (Panel): Real-world attack scenarios on major entities like Kyivstar and Ukrzaliznytsia were sobering. Investment in security directly impacts customer trust.
* ๐Ÿ›ก My take: This is the clearest illustration that security isn't an expense, but a vital investment in reputation.

๐Ÿ”ฅ ๐™ˆ๐™ฎ ๐™ˆ๐™–๐™ž๐™ฃ ๐˜พ๐™ค๐™ฃ๐™˜๐™ก๐™ช๐™จ๐™ž๐™ค๐™ฃ: Cybersecurity is a marathon, not a sprint. We need to be in it for the long haul.

๐Ÿค” Which of these trends concerns you most? Is your organization already preparing for the post-quantum era?

Save this post for 2025.โคต๏ธ

๐Ÿ“ฃShare if you found this helpful.

#CyberSecurity #AISecurity #APT

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘16๐Ÿคฏ1
I am inspired by Ukraineโ€™s cyber resilience. โค๏ธโ€๐Ÿ”ฅ

In todayโ€™s world, cyber threats donโ€™t pause for anyone. They adapt. They evolve. And in times of conflict, they become relentless.

Ukraineโ€™s cyber defense has shown extraordinary strength. Our ability to stand firm against sophisticated adversaries is nothing short of remarkable.

๐™’๐™๐™–๐™ฉ ๐™˜๐™–๐™ฃ ๐™ฌ๐™š ๐™ก๐™š๐™–๐™ง๐™ฃ ๐™›๐™ง๐™ค๐™ข ๐™ž๐™ฉ?

1. Vigilance matters. Threat actors are always looking for vulnerabilities, and being proactive is the only way to stay ahead.

2. Cyber hygiene is non-negotiable. Regular updates, strong passwords, and employee training are not โ€œextrasโ€ โ€“ theyโ€™re essentials.

3. Collaboration is powerful. Sharing intelligence across teams, industries, and borders can make or break your defenses.

Resilience doesnโ€™t happen overnight. It takes continuous effort, adaptability, and a mindset that refuses to settle for โ€œgood enough.โ€

Kudos to all Ukrainians for setting the bar high. ๐Ÿซก

What steps are you taking to strengthen your cyber defense? ๐Ÿ‘‡

#CyberSecurity #InfoSec #UkraineResistance

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘11
Top 10 things that help me protect sensitive data.

A while back, I thought โ€œdata protectionโ€ meant setting up a few strong passwords and ensuring disk encryption.
I was wrong.

Today, data lives everywhere. And protecting it takes more than tools โ€” it takes strategy.

Hereโ€™s what Iโ€™ve learned (and yes, Iโ€™m still learning ๐Ÿ˜‰):

1๏ธโƒฃ Define your data goals
โ†’ Know whatโ€™s critical.
โ†’ Know where it lives.
โ†’ Talk to the business side โ€” risk and budget matter.

2๏ธโƒฃ Automate data classification
โ†’ No one has time to tag files manually.
โ†’ Let smart tools do the heavy lifting.

3๏ธโƒฃ Implement Zero Trust
โ†’ โ€œNever trust, always verifyโ€ is more than a buzzword.
โ†’ Give people only what they actually need.

4๏ธโƒฃ Centralize your DLP
โ†’ One place. Full visibility.
โ†’ Less chaos, fewer false positives.

5๏ธโƒฃ Secure common exit points
โ†’ Web, email, SaaS, and all the BYOD stuff.
โ†’ Browser isolation helps with sketchy devices.

6๏ธโƒฃ Unify your policies
โ†’ No more โ€œwho owns what.โ€
โ†’ One rulebook, one language.

7๏ธโƒฃ Block bad stuff in real time
โ†’ Alerts after the fact? Too late.
โ†’ Catch it before it walks out the door.

8๏ธโƒฃ Connect your tools
โ†’ No one wants another dashboard.
โ†’ Integrate with what you already use.

9๏ธโƒฃ Make it easy for users
โ†’ If securityโ€™s a pain, people will go around it.
โ†’ Smooth UX = better compliance.

๐Ÿ”Ÿ Plan for AI and BYOD madness
โ†’ AI tools are everywhere.
โ†’ So are unmanaged devices.
โ†’ Set your guardrails now.

These 10 have saved me time, stress, and (probably) a few audits.๐Ÿ™ƒ

Save this post to your bookmarks and comment below! ๐Ÿ‘‡

#CyberSecurity #InfoSec #DataProtection

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘9
๐Ÿ‘2๐Ÿค”1
I've been writing for 7 years, and this post just reminded me why I still struggle.

(original author post link)

I saw this line and had to pause:
โ€œThe 'write like you talk ' principle completely changed my game. I used to write like I was submitting a college paper โ€“ formal, stiff, trying to sound smart. Now I write like I'm texting my best friend about something I'm genuinely excited about. Game changer.โ€

That hit home for me.

In my early days, I tried to sound 'clean.' Every sentence felt heavy. Every word had to be perfect. I thought smart writing meant big words and long sentences.

But my writing was not fun. Not all people were connected with it.

When I learned to write like I talk, things changed๐Ÿ’ก. My ideas felt more real. People started to reply and share their own stories. I felt like I had found my voice.

But I still have one big struggle: ๐™–๐™™๐™ซ๐™š๐™ง๐™—๐™จ. I want to cut them, but they sneak in when I am not watching.๐Ÿ˜…

From this list of 7 writing rules, thatโ€™s my weak spot. Curious if anyone else feels the same.

Here is one more tip I would add as #8:
โ†’ Read your work out loud before you share it. You catch the parts that sound wrong, the words that do not flow, and you hear where your voice is missing. (Trust me, it works!)

Also, I do not fully agree with the 'never be formal ' rule. Sometimes a little formality helps. It can show respect or match your readerโ€™s style.

After 7 years, I am still learning. Writing is always about finding your real voice, but also being open to new ideas.

If you're curious, hereโ€™s the link to my personal blog I started back in 2018: https://t.iss.one/dreamerdiary ๐ŸŒฑ

Which principle changed your writing most?

Is there a rule you think does not fit your style? ๐Ÿ‘‡

#WritingTips #Copywriting #Storytelling #PersonalBranding

@securediary
๐Ÿ‘7๐Ÿคฏ1
Most companies fear cyberattacks. But misconfigurations are the real silent killer. ๐Ÿซจ

Cloud misconfigurations are everywhere.
They hide in small mistakes, missed settings, or rushed rollouts.

Capital One lost $1.8M because of a single overlooked setting. ๐Ÿ’ฐ
(No, it was not a fancy hack. It was a tiny checkbox left open.)

Hereโ€™s what I learned:

โ†’ 80% of cloud breaches start with simple misconfigurations.
โ†’ Old security tools miss these gaps.
โ†’ The biggest risks are often the ones no one sees.

Want to know where to look first?
Here are the Top 5 cloud misconfigurations I check every time:

1. Publicly open storage buckets (easy target!)
2. Weak access controls (too many people with keys)
3. Missing encryption (data left in plain sight)
4. Default passwords still active (yes, it happens)
5. Unmonitored services (no alerts, no eyes)

How do I prevent these?
I use a simple playbook:
โ†’ Review cloud settings often
โ†’ Set alerts for changes
โ†’ Limit access to what people need
โ†’ Remove unused accounts fast
โ†’ Train teams on what to watch for

Cloud security does not need to be hard.
But it does need care.
One small mistake can cost a lot.

Have you seen a cloud misconfiguration at work?
How did you fix it?
Your story could help save someone elseโ€™s data. ๐Ÿ‘‡

#CloudSecurity #CyberSecurity #ThreatFridays

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘12