
Clint Gibler
@clintgibler
Followers
22K
Following
5K
Media
1K
Statuses
9K
๐ก๏ธ Head of Security Research @semgrep ๐ Creator of https://t.co/xwtIAI0CuJ newsletter
Join 90,000+ readers โ
Joined July 2012
The post describes the purpose of the core types of security teams (IT, Security Operations, GRC, and Product Security) and provides a comprehensive 24-month hiring plan broken down by quarters and teams, with specific job titles and levels for each role. Great resource love it!
1
0
1
Tad recommends adjusting the ratio based on how critical your company is as a vendor within your customerโs supply chain attack thread model: - Critical: 1:29 - High: 1:40 - Medium: 1:75 - Low: 1:100
1
0
2
Living with blindness or vision loss shouldnโt limit mobility. These riders say Waymo can help improve their independence.
0
2
16
TL;DR: Tad Whitaker recommends: - 1:40 security:Full Time Employee (FTE) ratio - 1:100 IT:FTE. GitHub had a 1:40 ratio. GitLab 1:24.
1
0
1
๐๐ญ๐๐ซ๐ญ๐ฎ๐ฉ ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ: ๐๐๐ญ๐ข๐จ๐ฌ ๐๐ง๐ ๐ 24-๐๐จ๐ง๐ญ๐ก ๐๐ข๐ซ๐ข๐ง๐ ๐๐ฅ๐๐ง How companies like Datadog, HashiCorp, GitHub, GitLab, Segment, Optimizely staff security teams, based on CISO interviews.
1
1
15
Keep up with security research in 7min/week: ๐บ Talks ๐ ๏ธ Tools and Blog posts ๐งช Research Projects Join 90,000+ security professionals: https://t.co/bniXZXohib Follow me @clintgibler for more!
tldrsec.com
The best way to keep up with cybersecurity research. Join >90,000 security professionals getting the best tools, talks, and resources right in their inbox for free.
0
0
2
๐ข Sponsor: Harmonic Security (@harmonicsec) Agentic AI is here. Visibility isnโt. Weโre building Harmonic MCP Gateway: lightweight controls and visibility for AI-driven workflows. Launching soon โ
harmonic.security
Get info first when it drops.
1
0
1
๐ tl;dr sec 300 ๐ง๐ปโ๐ป Security Headcount Ratios + Hiring Plan, ๐ค MCP Security, ๐ Compliance https://t.co/af24im8xHf
tldrsec.com
Plus my reflections on writing 300 issues and seeing Semgrep growing up
1
0
6
Also: Exact Fix Commands - Cloud-specific CLI commands for remediation. Evidence Collection Guides - Step-by-step screenshots auditors accept. Priority-Based Fixes - Critical issues that will fail your audit vs. nice-to-haves. ๐
github.com
AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection - guardian-nexus/auditkit
0
0
2
โ
๐๐ฎ๐๐ข๐ญ๐๐ข๐ญ: Multi-cloud compliance scanner & evidence collection. โAlternative to $20k/year compliance tools.โ ๐ 64 SOC2 controls, 30 PCI-DSS controls, 17 CMMC Level 1 controls.
1
4
17
The post recommends: ๐Treat scanner and automation credentials as sensitive assets. ๐ Prefer key-based authentication over passwords. ๐ Disable legacy protocols like NTLMv1. ๐ Validate that Linux EDR solutions provide meaningful security coverage. #cybersecurity
1
0
0
Hey, New York โ Brian thinks he's our new CFO. We gave him a stage to prove it.
1
5
35
Techniques to steal credentials: โ
SSH service environment variable modification โ
Process tracing (strace sshd) โ
Malicious PAM modules โ
Honeypot redirection None of which triggered alerts in their testing of major Linux EDR products ๐
OK so what can we do about it?
1
0
0
Adam gives an example of capturing vulnerability scanner credentials by instrumenting SSH on a compromised server, without triggering Linux EDR alerts.
1
0
0
This risk also applies to: asset inventory platforms, IT automation frameworks, and management tools. Any of these can become security risks when using password-based authentication or insecure protocols.
1
0
0
๐๐๐ญ๐ญ๐ข๐ง๐ ๐ก๐๐๐ค๐๐ ๐๐๐๐๐ฎ๐ฌ๐ ๐จ๐... ๐ฒ๐จ๐ฎ๐ซ ๐ฏ๐ฎ๐ฅ๐ง๐๐ซ๐๐๐ข๐ฅ๐ข๐ญ๐ฒ ๐ฌ๐๐๐ง๐ง๐๐ซ? ๐ฑ Praetorian's Adam Crosser on how stealing credentials from a scanner helped them pivot/escalate on a Fortune 500 company. Here's how:
1
0
4
Keep up with security research in 7min/week: ๐บ Talks ๐ ๏ธTools and Blog posts ๐งช Research Projects Join 90,000+ security professionals: https://t.co/bniXZXohib Follow me @clintgibler for more!
tldrsec.com
The best way to keep up with cybersecurity research. Join >90,000 security professionals getting the best tools, talks, and resources right in their inbox for free.
0
0
2
๐ข Sponsor: @tamnoon_io's AI agent for CloudSecOps automates investigation and delivers production-safe fixes, turning endless alerts into easy-to-implement solutions validated by expert CloudPros. https://t.co/hxQ9sjwNj2
1
0
2
๐ tl;dr sec 299 ๐ค The Security Engineer's Guide to MCP, โ๏ธ IAM Hound Dog, ๐ง๐ปโ๐ป IMDS Anomaly Detection Plus discussing AI in Cybersecurity with my friends, Mitchell Stuart and Conor Sherman on their new podcast, Zero Signal. ๐๏ธ https://t.co/HJ1EpsUFxy
tldrsec.com
Quickly get up to speed in MCP security, tool to identify privilege escalation in AWS, find 0days and attackers via anomalous IMDS calls
1
2
16
And a great, concise cheatsheet of what you should look for as a security engineer for both MCP clients and servers. https://t.co/iDbFKf7qfh
semgrep.dev
MCP is quickly becoming the API standard for AI coding agents. That means new attack surfaces โ and security engineers need to know how to test them safely.
0
2
22