Cyber Security + Data Science

Hi friends, feel free to move this post if it isn’t the right place! I’m a senior data scientist at a big tech company with a background in trust and safety. I’ve had a lot of fun hunting bad guys

Hey I was just wondering if anyone had a good virus free autoclicker?

Or any other suggestions

California Pizza Kitchen Data Breach Exposed Over 100,000 Employee Social Security Numbers

California Pizza Kitchen Data Breach Exposed Over 100,000 Employee Social Security Numbers

Would you say that most midsize U.S. companies are behind on cybersecurity measures?

Would you say that most midsize U.S. companies are behind on cybersecurity measures?

Bitlocker FDE with and without Preboot Authentication

Hi /r/cybersecurity, Please help me understand the differences between the two. Trying to justify the trade-off between security and usability to myself before going to management with my recommendation. Both scenarios assume secured BIOS configurations to eliminate physical threats. User

Which is better for 3gb ram pandadome free or malwarefox?

As i said in the last post i have a intel i core 2 duo with 3gb ram. which one is better for my specs? I have heard both are good and lightweight but i want to know which uses

Enterprise Browser Security

What are people doing to managed the browser? Do you have a regime for managing settings, controlling extensions, patching extensions when you patch software, ad blocking, blocking DNS, DoH, single corp browser vs personal choice for chrome, firefox etc. Do

What’s the best anti virus?This year!

What’s the best anti virus?This year!

Any military here? Has your experience helped you out during your cyber security career journey?

Any military here? Has your experience helped you out during your cyber security career journey?

Is this safe or actually malware?

Is this safe or actually malware?

Will AI Pentesters be a new role in security teams?

I am very interested in this new topic, and more focused on Adversarial Machine Learning. How can we protect our models from attackers inside or outside our organizations? I have shared here some articles to discuss if this is a

United States is designating six Iranian individuals and one Iranian entity, pursuant to Executive Order (E.O.) 13848, for their roles in attempting to influence the 2020 U.S. presidential election.

United States is designating six Iranian individuals and one Iranian entity, pursuant to Executive Order (E.O.) 13848, for their roles in attempting to influence the 2020 U.S. presidential election.

What to expect at a second, “meet the leadership” interview?

Hi cyber community. I’ve recently got an entry level qualification in Cyber and applied for a L1 Analyst role. I’ve managed to pass the first “casual” interview, which was great, we talked some troubleshooting and some light technical stuff but

Hackers backed by Iran are targeting US critical infrastructure, US warns

Hackers backed by Iran are targeting US critical infrastructure, US warns

The Top Cybersecurity Trends for 2022 – Stay Safe Online

The Top Cybersecurity Trends for 2022 – Stay Safe Online