🦾 ARM / Snapdragon X Elite on laptops with Linux :linux:
Qualcomm has been working to upstream Linux support for this high-end "System on a Chip" device asset!
◉Snapdragon X Elite is a bit of a momentum for ARM powered processing
◉Upon success it'll disrupt the x86-processor (e.g. Intel dominated market)
◉One of ARM's benefits is great battery life
I was introduced to a new security product at work for email, and apparently the first 100 email inboxes are free. Doesn't require any MX or DNS server changes just a Microsoft 365 or Google Workspace API.
Si quelqu'un a un job d'amin cybersecurité dans le sud de Paris avec télétravail (par pitié) n'hésitez pas à me faire signe. J'suis sympa, je m'intègre bien et je suis moins bête que je n'en ai l'air.
J'ai bossé sur #cyberark
Je suis très bonne en systèmes #windows et cherche à me former sur #linux
Je parle couramment l'anglais
J'ai travaillé sur le #SOC#checkpoint
Je fais du #powershell à mes heures perdues
They stood for a challenge we had 15–20 years ago, when individuals said they cared about #webstandards, #accessibility, separation of concerns (#SOC), #conformance, but were not found to walk the talk.
The good news is, we don’t have this problem anymore.
The bad news is, it’s not that everyone was into quality now—it’s more that people seem indifferent.
Now, our field can use standardistas. True ones—but maybe also armchair ones.
I tested all night, but here's my run of benchmarks for video editing, podcast mixing, file compression, photo processing, and some EARLY thoughts on gaming.
I can't recall a single bigger leap year over year, while also seeing some early trends I find VERY concerning...
I have no idea how such a shitty product can exist. Same price buys you a Chromebook; there are plenty of software libre distraction-free writing apps out there (try opening a terminal and typing "vim"?).
Or you could chicken out and buy a Kindle Fire Max 11 with keyboard case for the same price.
Both of these let you type for more than a day on a charge: the only benefit of the freewrite alpha is an 80 hour battery, which is pointless with USB-C charging everywhere.
@cstross some #TechIlliterate even recommended this shit to me instead if a #Laptop when I was in school.
I told them unless it comes with the same #TTS voice as #StevenHawking has I don't want them to ever be allowed to make any technical decision or suggestion in their life!
Those things are like #TexasInstruments#calculators: an absolute #ripoff given even the shittiest #Netbook with the abundant #Intel#Z3735F#SoC running #OS1337 is more versatile.
And I literally just started that distro.
Wow, Intel's new integrated graphics based on the new Arc architecture is really competitive, beating AMD's current generation by quite a margin!
I actually really like seeing Intel getting competitive in this area, as it increases competition nicely!
Good morning #Fediverse friends and happy Wednesday!
Let’s kick the day off with our usual #KoffeeWithKyle chat and see what everyone has in store for the day.
For me it’s the usual work stuff. Have to go through come #SOC findings for our clients. Later today my youngest has an orchestra concert. Then it’s just some school work.
Is generative AI the future for our smartphones? https://youtu.be/iwuXds7qfPU
I sit down with two #MediaTek executives during the #MediaTekSummit to discuss powerhouse phone chips, fast modems, AI, and how MediaTek feels they compare against Apple and Qualcomm!
If you're a small/medium business and struggled with log collection and searching for a Windows environment, then you should take a look at Cybersecurity and Infrastructure Security Agency's open source LME tool.
This is a collection of instructions, GPOs, and #ELK that walk you through log forwarding, collection and searching. This is a really great resource!
Thrilled to launch So You Want to be a SOC Analyst? 2.0 -- Now, with no requirements to run your own VMs!
SYWTBSA 2.0 enables paid subscribers of my blog to dive into this 6-part threat detection & response lab using a fully self-contained, cloud hosted VM. Also, much of the setup steps have been taken care of for you, enabling you to dive right into the best parts of the lab.
Also, this version of SYWTBSA has been tweaked and revamped specially for this cloud-hosted version.
The M3 chips are the first personal computer chips built using the industry-leading 3-nanometer process technology, allowing more transistors to be packed into a smaller space and improving speed and efficiency.
Together, these cores create a CPU that delivers the same multithreaded performance as M1 using as little as half the power, and up to 35 percent more performance at peak power
Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.
Attackers are now attempting to move laterally into cloud environments via SQL Server instances—a method previously seen in VMs and Kubernetes clusters but not in SQL Server.
Does anyone know where I can find a good template for a Security Operations Center charter? I found a lot of summaries of what stuff goes in one but I want an actual template so I don’t have to reinvent the wheel.
Why is it that you can install any version of #Windows or #Linux on basically any #x86 chip, but you can't install #Android on just any#ARM phone or #sbc
Everybody always says to stick to #raspberrypi because of "support" meaning there are OS images for it
I gather that each #SoC has a unique set of modems and gpus for which a custom build of Android must be used, but Windows systems come in millions of configurations and they just load drivers on the fly
Some material I'm studying is differentiating between a "security analyst, an "information security analyst," and a "SOC analyst."
What is the major difference between the three roles if there are significant differences? Up until now I thought they were pretty much synonymous and variations on basically the same job role.
The Lowdown: Think of a security analyst as the superhero of the digital world. They're the ones wearing invisible capes, swooping in to save the day from nasty cyber villains.
The Gigs:
Playing detective to spot the sneaky vulnerabilities in the system.
Setting up digital traps (like firewalls) to catch cyber baddies.
Being the watchdog, always on the lookout for anything fishy.
Keeping tabs on the latest cyber gossip and trends.
Teaming up with the IT squad for some tech magic.
Information Security Analyst:
The Lowdown: These folks are like the secret agents of data protection. Their mission? Guard the secrets!
The Gigs:
Crafting the rulebook on "How Not to Get Hacked 101."
Being the digital detective, always on the hunt for breaches.
Setting up digital shields and armor to guard the kingdom's data.
Playing offense with some sneaky penetration testing.
Giving IT the lowdown on the latest security bling.
SOC Analyst (Security Operations Center Analyst):
The Lowdown: Picture a high-tech war room. Screens everywhere, numbers flashing, alarms sounding. In the middle of it all? The SOC analyst, the commander-in-chief of cyber battles.
The Gigs:
Glued to screens, watching for any signs of a cyber ambush.
Jumping into action mode when things go south.
Rallying the troops (aka the incident response team) when there's a breach.
Using some James Bond-level tools to spot the bad guys.
Whipping up reports that even your grandma would understand.
There is an awesome cybersecurity role, for a mid-senior (L2/L3?) SOC analyst for a great team looking after global security in a complex environment. The role is remote but you must already be based in the UK or Spain with a right to work in that country.
You will get to work with some incredible people and for an awesome boss. The hours are good, with (currently) no expectation of shifts or objectionable hours and the pay is excellent. The organisation is committed to staff development and will give you the chance to use some cutting-edge security tools.
The ideal candidate will have a good technical background and absolutely requires experience working in a SOC. You will be expected to work without supervision and be able to move beyond existing playbooks and respond to situations where the full security stack hasn't been deployed. You will be expected to understand common attacks and know what to look for in the early stages of an intrusion. Importantly, you need to have a clear idea of when you will hit your current limits and escalate to L3/IR.
⚠ Important Note: I am not the hiring manager. You will not work for me. I do not select the candidates. I am not a JLL employee. You can only apply via the link below, so there is no point in sending me your CV as it will just make it look like you haven't read the post. ⚠