clintgibler Profile Banner
Clint Gibler Profile
Clint Gibler

@clintgibler

Followers
22K
Following
5K
Media
1K
Statuses
9K

๐Ÿ—ก๏ธ Head of Security Research @semgrep ๐Ÿ“š Creator of https://t.co/xwtIAI0CuJ newsletter

Join 90,000+ readers โ†’
Joined July 2012
Don't wanna be here? Send us removal request.
@clintgibler
Clint Gibler
3 days
The post describes the purpose of the core types of security teams (IT, Security Operations, GRC, and Product Security) and provides a comprehensive 24-month hiring plan broken down by quarters and teams, with specific job titles and levels for each role. Great resource love it!
1
0
1
@clintgibler
Clint Gibler
3 days
Tad recommends adjusting the ratio based on how critical your company is as a vendor within your customerโ€™s supply chain attack thread model: - Critical: 1:29 - High: 1:40 - Medium: 1:75 - Low: 1:100
1
0
2
@WaymoCommunity
Waymo community
7 days
Living with blindness or vision loss shouldnโ€™t limit mobility. These riders say Waymo can help improve their independence.
0
2
16
@clintgibler
Clint Gibler
3 days
TL;DR: Tad Whitaker recommends: - 1:40 security:Full Time Employee (FTE) ratio - 1:100 IT:FTE. GitHub had a 1:40 ratio. GitLab 1:24.
1
0
1
@clintgibler
Clint Gibler
3 days
๐’๐ญ๐š๐ซ๐ญ๐ฎ๐ฉ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ: ๐‘๐š๐ญ๐ข๐จ๐ฌ ๐š๐ง๐ ๐š 24-๐Œ๐จ๐ง๐ญ๐ก ๐‡๐ข๐ซ๐ข๐ง๐  ๐๐ฅ๐š๐ง How companies like Datadog, HashiCorp, GitHub, GitLab, Segment, Optimizely staff security teams, based on CISO interviews.
1
1
15
@clintgibler
Clint Gibler
4 days
Keep up with security research in 7min/week: ๐Ÿ“บ Talks ๐Ÿ› ๏ธ Tools and Blog posts ๐Ÿงช Research Projects Join 90,000+ security professionals: https://t.co/bniXZXohib Follow me @clintgibler for more!
Tweet card summary image
tldrsec.com
The best way to keep up with cybersecurity research. Join >90,000 security professionals getting the best tools, talks, and resources right in their inbox for free.
0
0
2
@clintgibler
Clint Gibler
4 days
๐Ÿ“ข Sponsor: Harmonic Security (@harmonicsec) Agentic AI is here. Visibility isnโ€™t. Weโ€™re building Harmonic MCP Gateway: lightweight controls and visibility for AI-driven workflows. Launching soon โ†’
Tweet card summary image
harmonic.security
Get info first when it drops.
1
0
1
@clintgibler
Clint Gibler
4 days
๐Ÿ“š tl;dr sec 300 ๐Ÿง‘๐Ÿปโ€๐Ÿ’ป Security Headcount Ratios + Hiring Plan, ๐Ÿค– MCP Security, ๐Ÿ“‘ Compliance https://t.co/af24im8xHf
Tweet card summary image
tldrsec.com
Plus my reflections on writing 300 issues and seeing Semgrep growing up
1
0
6
@clintgibler
Clint Gibler
6 days
Also: Exact Fix Commands - Cloud-specific CLI commands for remediation. Evidence Collection Guides - Step-by-step screenshots auditors accept. Priority-Based Fixes - Critical issues that will fail your audit vs. nice-to-haves. ๐Ÿ”—
Tweet card summary image
github.com
AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection - guardian-nexus/auditkit
0
0
2
@clintgibler
Clint Gibler
6 days
โœ… ๐€๐ฎ๐๐ข๐ญ๐Š๐ข๐ญ: Multi-cloud compliance scanner & evidence collection. โ€œAlternative to $20k/year compliance tools.โ€ ๐Ÿ˜‚ 64 SOC2 controls, 30 PCI-DSS controls, 17 CMMC Level 1 controls.
1
4
17
@clintgibler
Clint Gibler
6 days
The post recommends: ๐Ÿ‘Treat scanner and automation credentials as sensitive assets. ๐Ÿ‘ Prefer key-based authentication over passwords. ๐Ÿ‘ Disable legacy protocols like NTLMv1. ๐Ÿ‘ Validate that Linux EDR solutions provide meaningful security coverage. #cybersecurity
1
0
0
@tryramp
Ramp
24 hours
Hey, New York โ€” Brian thinks he's our new CFO. We gave him a stage to prove it.
1
5
35
@clintgibler
Clint Gibler
6 days
Techniques to steal credentials: โœ… SSH service environment variable modification โœ… Process tracing (strace sshd) โœ… Malicious PAM modules โœ… Honeypot redirection None of which triggered alerts in their testing of major Linux EDR products ๐Ÿ˜… OK so what can we do about it?
1
0
0
@clintgibler
Clint Gibler
6 days
Adam gives an example of capturing vulnerability scanner credentials by instrumenting SSH on a compromised server, without triggering Linux EDR alerts.
1
0
0
@clintgibler
Clint Gibler
6 days
This risk also applies to: asset inventory platforms, IT automation frameworks, and management tools. Any of these can become security risks when using password-based authentication or insecure protocols.
1
0
0
@clintgibler
Clint Gibler
6 days
๐†๐ž๐ญ๐ญ๐ข๐ง๐  ๐ก๐š๐œ๐ค๐ž๐ ๐›๐ž๐œ๐š๐ฎ๐ฌ๐ž ๐จ๐Ÿ... ๐ฒ๐จ๐ฎ๐ซ ๐ฏ๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ ๐ฌ๐œ๐š๐ง๐ง๐ž๐ซ? ๐Ÿ˜ฑ Praetorian's Adam Crosser on how stealing credentials from a scanner helped them pivot/escalate on a Fortune 500 company. Here's how:
1
0
4
@clintgibler
Clint Gibler
11 days
Keep up with security research in 7min/week: ๐Ÿ“บ Talks ๐Ÿ› ๏ธTools and Blog posts ๐Ÿงช Research Projects Join 90,000+ security professionals: https://t.co/bniXZXohib Follow me @clintgibler for more!
Tweet card summary image
tldrsec.com
The best way to keep up with cybersecurity research. Join >90,000 security professionals getting the best tools, talks, and resources right in their inbox for free.
0
0
2
@clintgibler
Clint Gibler
11 days
๐Ÿ“ข Sponsor: @tamnoon_io's AI agent for CloudSecOps automates investigation and delivers production-safe fixes, turning endless alerts into easy-to-implement solutions validated by expert CloudPros. https://t.co/hxQ9sjwNj2
1
0
2
@clintgibler
Clint Gibler
11 days
๐Ÿ“š tl;dr sec 299 ๐Ÿค– The Security Engineer's Guide to MCP, โ˜๏ธ IAM Hound Dog, ๐Ÿง‘๐Ÿปโ€๐Ÿ’ป IMDS Anomaly Detection Plus discussing AI in Cybersecurity with my friends, Mitchell Stuart and Conor Sherman on their new podcast, Zero Signal. ๐ŸŽ™๏ธ https://t.co/HJ1EpsUFxy
Tweet card summary image
tldrsec.com
Quickly get up to speed in MCP security, tool to identify privilege escalation in AWS, find 0days and attackers via anomalous IMDS calls
1
2
16