okla.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Oklahoma... we're trying ya'll

Administered by:

Server stats:

34
active users

#incidentresponse

6 posts5 participants0 posts today
Discernible<p>You wake up to your phone buzzing. It's not supposed to do that at this hour. Not unless something is very, very wrong.</p><p>What will you do in the critical first hour?</p><p>Join our next immersive blockchain security communications simulation where split-second decisions collide with core DeFi principles.</p><p>Multiple stakeholders. <br>Millions at stake. <br>Only a few minutes to act.</p><p>Can you balance technical truth with human realities when the clock is ticking?</p><p>Register today to join our weekly drills and participate in next week's Web3 simulation.</p><p><a href="https://infosec.exchange/tags/Web3Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Web3Security</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/SecurityCommunications" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityCommunications</span></a> <a href="https://infosec.exchange/tags/ProfessionalDevelopment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ProfessionalDevelopment</span></a></p>
Discernible<p>Weekly security communication practice with your peers!</p><p>Join industry colleagues in 60-min weekly Slack simulations where you can:</p><p>✅ Test communication approaches you can't try at work<br>✅ Learn from diverse perspectives across organizations<br>✅ Build "muscle memory" for high pressure communication<br>✅ Network with professionals facing similar challenges</p><p>Unlike traditional tabletops, these bite-sized drills fit your schedule and focus on practical communication skills across 12 security incident categories.</p><p>Available now starting at $50/month.</p><p>Learn more: <a href="https://discernibleinc.com/drills" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">discernibleinc.com/drills</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/SecurityCommunication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityCommunication</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <br><a href="https://infosec.exchange/tags/ProfessionalDevelopment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ProfessionalDevelopment</span></a></p>
LMG Security<p>Hackers are combining email bombing attacks with help-desk impersonation to trick employees into giving remote access—and it’s working.</p><p>In this new video, we share a real-world attack scenario and show you how to spot and stop these advanced social engineering techniques.</p><p>Watch now: <a href="https://youtu.be/RhKFx_ZRz4A" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/RhKFx_ZRz4A</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/EmailBombing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EmailBombing</span></a> <a href="https://infosec.exchange/tags/MicrosoftTeams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MicrosoftTeams</span></a> <a href="https://infosec.exchange/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialEngineering</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a></p>
LMG Security<p>Did you know a ransomware tabletop exercise can uncover gaps and failure points in your incident response plan? A recent study found it can also reduce your data breach costs by an average of $248K! If you have not planned a ransomware tabletop exercise already, it's time to put this on your schedule!</p><p>In our new blog, we share common failure points, <span class="h-card" translate="no"><a href="https://infosec.exchange/@MDurrin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>MDurrin</span></a></span>'s favorite ransomware tabletop exercise scenarios, and tips to help you get the most out of your next exercise.</p><p>Read the blog: <a href="https://www.lmgsecurity.com/how-a-ransomware-tabletop-exercise-can-dramatically-reduce-your-losses-if-youre-attacked/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/how-a-ransomwa</span><span class="invisible">re-tabletop-exercise-can-dramatically-reduce-your-losses-if-youre-attacked/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/TabletopExercise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TabletopExercise</span></a> <a href="https://infosec.exchange/tags/CyberResilience" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberResilience</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsecurity</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a></p>
FIRST.org<p>Is there someone that has inspired you in incident response? Consider nominating them! 🏆The FIRST Incident Response Hall of Fame recognizes ✨excellence✨. Criteria includes impact, influence, innovation &amp; more. Submit your nomination by March 14th: <a href="https://go.first.org/HJNg7" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">go.first.org/HJNg7</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/IRHoF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IRHoF</span></a> <a href="https://infosec.exchange/tags/FIRST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FIRST</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a></p>
Walker<p>Some peoples thought process is fascinating. For example, when faced with connection issues between a cloud service and an S3 bucket or MongoDB instance with default creds, the decision made is not to troubleshoot the blockage. But instead to remove all firewalls and ACLs between the services. </p><p>Sure it will get connectivity working for your project, but will also provide connectivity for the entire Internet to the internal resources.</p><p>Then everyone gets a Surprised Pikachu face when the data gets stolen and a ransomware note is left in its place. </p><p>Its the same result... EVERY TIME.</p><p><a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/s3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>s3</span></a> <a href="https://infosec.exchange/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://infosec.exchange/tags/waf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>waf</span></a></p>
FIRST.org<p>You've read your daily news, but have you looked at the agenda for the Amsterdam 2025 FIRST TC yet? 👀🔗<a href="https://go.first.org/KFYHZ" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">go.first.org/KFYHZ</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/technical" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technical</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://infosec.exchange/tags/securityteams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityteams</span></a></p>
Discernible<p>We're growing our weekly Discernible Drills and want YOUR input!</p><p>Help us select the best times to add by taking our quick scheduling survey. </p><p>It takes less than 2 minutes to complete — and your feedback will ensure we can accommodate as many participants as possible in our expansion. </p><p>📋 Survey link: <a href="https://forms.gle/W8KjwQqEYGHr2Rxy8" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">forms.gle/W8KjwQqEYGHr2Rxy8</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <br><a href="https://infosec.exchange/tags/SecurityCommunications" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityCommunications</span></a></p>
The DFIR Report<p>🙏 Huge THANK YOU to everyone who joined the DFIR Labs CTF this weekend!</p><p>Over 200 people from around the world jumped in to tackle challenges based on a real case—and we hope you all had fun, learned something new, and sharpened your DFIR skills 🔎💻</p><p>Keep an eye on our socials for the next DFIR Labs CTF announcement!</p><p>💡 Interested in running a CTF at your organization? Please fill out this form and we’ll get in touch: <a href="https://form.jotform.com/243245571640252" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">form.jotform.com/2432455716402</span><span class="invisible">52</span></a></p><p>The case featured in this CTF is now available: <a href="https://store.thedfirreport.com/products/mud-in-the-water-private-case-29823" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">store.thedfirreport.com/produc</span><span class="invisible">ts/mud-in-the-water-private-case-29823</span></a></p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a></p>
Dissent Doe :cupofcoffee:<p>Scenario: Someone is notifying you of a data breach that occurred almost a year ago. They refer it to as a "recent incident."</p><p>Their notification does not tell you WHEN the incident occurred, WHEN they first discovered it, or the fact that the data were leaked more than 6 months ago. They just talk about a "recent incident." </p><p>I wish they weren't allowed to get away with such deceptive notices. </p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/transparency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>transparency</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a></p>
Chum1ng0 - Security Research :verified:<p>🇰🇷 Kakao Enterprise sufrió un incidente de seguridad</p><p>🔗 <a href="https://blog.security-chu.com/2025/03/kakao-enterprise-sufrio-un-incidente-de.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.security-chu.com/2025/03/</span><span class="invisible">kakao-enterprise-sufrio-un-incidente-de.html</span></a> </p><p><a href="https://infosec.exchange/tags/Kakao" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kakao</span></a> <a href="https://infosec.exchange/tags/ciberseguridad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ciberseguridad</span></a> <a href="https://infosec.exchange/tags/LATAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LATAM</span></a> <a href="https://infosec.exchange/tags/noticias" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>noticias</span></a> <a href="https://infosec.exchange/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/dataleak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataleak</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a></p>
Discernible<p><a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/SecurityCommunications" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityCommunications</span></a></p>
FIRST.org<p>Get it while it's hot! The agenda for the Amsterdam 2025 FIRST TC is out now. 📰🔗<a href="https://go.first.org/KFYHZ" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">go.first.org/KFYHZ</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/technical" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technical</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://infosec.exchange/tags/securityteams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityteams</span></a></p>
Discernible<p>We're expanding our weekly IR communication drills! </p><p>Help us pick the best times by ranking your preferences in our quick survey. Your input matters and will help us accommodate more participants.</p><p>Survey link: <a href="https://docs.google.com/forms/d/e/1FAIpQLSeKtQNLlU4ZiFPBvG_p4RL9FhW5fF6fjVcvdJjO61Q4PNgpog/viewform" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.google.com/forms/d/e/1FAI</span><span class="invisible">pQLSeKtQNLlU4ZiFPBvG_p4RL9FhW5fF6fjVcvdJjO61Q4PNgpog/viewform</span></a></p><p><a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/SecurityCommunications" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityCommunications</span></a></p>
FIRST.org<p>The FIRST Board of Directors has unveiled a comprehensive Strategy Framework to enhance our ability to fulfill our mission as a global leader in cybersecurity and incident response.</p><p>This framework introduces a structured three-year Strategic Plan focused on five key objectives:</p><p>🌎 Global Recognition and Trust <br>⭐ Member Value Creation <br>📚 Development and Education <br>🤝 Trusted Venue for Standards <br>⚖️ Effective Governance and Financial Resilience</p><p>Learn more here: <a href="https://www.first.org/blog/20250303-Strategy-Framework" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">first.org/blog/20250303-Strate</span><span class="invisible">gy-Framework</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Josh Lemon<p><a href="https://infosec.exchange/tags/BYOVD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BYOVD</span></a> attacks are slowly becoming more common for threat actors to escalate privilege and kill security tools.<br>Make sure you're <a href="https://infosec.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatHunting</span></a> for new Vulnerable Drivers!<br>Win 11 now has a Vulnerable Driver Blocklist feature, however, it's only updated in major updates so you still need to monitor for recently discovered Vulnerable Drivers.</p><p>Recent Vuln Driver: <a href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-exploit-paragon-partition-manager-bug-in-byovd-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/ransomware-gangs-exploit-paragon-partition-manager-bug-in-byovd-attacks/</span></a></p><p>Known Vuln Drivers: <a href="https://www.loldrivers.io/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">loldrivers.io/</span><span class="invisible"></span></a></p><p>Vuln Driver Blocklist: <a href="https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">learn.microsoft.com/en-us/wind</span><span class="invisible">ows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules</span></a></p><p><a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatDetection</span></a></p>
Walker<p>More machines added to the list, the haystack just got bigger, that needle is more elusive than ever.</p><p>Problem is, no one is sure the needle exists. </p><p>In all seriousness, when does one know to stop looking for the needle? How exhaustive does an investigation need to be before all threads are chased. More of a rhetorical question. </p><p>Big on metaphors today. </p><p><a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a></p>
FIRST.org<p>FIRST was in Malawi this week delivering training and seminars with the mwCERT team (a FIRST member and FIRST Fellow) and their affiliated sector CSIRTs.</p><p>Over three days, Lawrence Muchilwa — as part of the African Regional Liaison Initiative — and Hadyn Green — from the Actioning Alerts and Advisories (A4) Initiative — ran training sessions covering incident response, technical actions and communications. These initiatives are graciously funded by the UK Government.</p><p>Following the training, a two-day Finance and Telecommunications cybersecurity conference was held in Mangochi under the theme "Navigating Cybersecurity in Finance and Telecommunications." MACRA Board Director Reverend Father Damaseke officially opened the event, describing it as "pivotal in the digital agenda drive" toward creating "a more secure and resilient cyberspace for all."</p><p>Christopher Banda, Head of Malawi CERT (a unit within MACRA), emphasized that as cyber threats evolve at an alarming pace, such gatherings are "not just beneficial, but essential" for protecting Malawi's financial and telecommunications sectors, which form the backbone of the economy.</p><p>This collaborative effort highlights FIRST's ongoing commitment to building cybersecurity capacity and establishing international trust networks in developing regions.</p><p>Thanks to LondonCyber for the support that enables this work!</p><p>Read more here: <a href="https://go.first.org/RQnWE" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">go.first.org/RQnWE</span><span class="invisible"></span></a></p><p>Photos credit: @MACRAMALAWI </p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
Walker<p>Regarding the recent Cyberhaven related Chrome plugin compromises, was a threat actor ever identified?</p><p>I have searched and have not found any attribution.</p><p><a href="https://infosec.exchange/tags/cyberhaven" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberhaven</span></a> <a href="https://infosec.exchange/tags/iran" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iran</span></a> <a href="https://infosec.exchange/tags/foxkitten" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foxkitten</span></a> <a href="https://infosec.exchange/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/threatactor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatactor</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
Discernible<p>🔥 Launching today: Discernible Drills - our new weekly security/privacy communication training delivered via Slack!</p><p>Based on 20 years of experience in, this new service helps security and privacy professionals practice communication skills through weekly 60-minute drills.</p><p>- Covers 12 different incident types<br>- Text-based with multimedia elements for auditory learners<br>- No PO required - individual subscriptions<br>- Currently runs Wednesdays 12-1pm ET with more times coming soon<br>- Two tiers: $50/mo or $100/mo</p><p>Security incidents are more than breaches, and communication is more than media statements. Practice makes perfect.</p><p>Learn more at <a href="https://discernibleinc.com/blog/introducing-discernible-drills" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discernibleinc.com/blog/introd</span><span class="invisible">ucing-discernible-drills</span></a></p><p><a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/SecurityCommunications" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityCommunications</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/PrivacyCommunications" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacyCommunications</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a></p>