A (61:59)
It's all right. So Google doing some security audit work with Intel. I'm curious why they did this. Okay, like, I hate to be. I hate to be this guy, but, like, I feel like old me wouldn't have thought of this. But, like, why is Google and Intel doing research on, like, did intel reach out and hire Google to do a hardware security analysis on this Technology, you know what I mean? Like what, what was the motivation? All right, so trust. Domain extension technology has several vulnerabilities. They're going to get it sorted out. TDX creates confidential virtual machines, hardware isolated VMs that deliver strong enforced protections. And Google, Google which has, you know, some of the best engineers out there identified five vulnerabilities, 35 bugs. Intel's patched them all. Ah, you got a Patchett. Okay. All right, so this is a pretty weak sauce story to end on. Here's the deal. If you want to have hardware isolated VM infrastructure, you're doing like national security work, very, very high level sensitivity, the, you know, fisma audit, like high confidentiality security objectives, then maybe you need to use this Intel TDX security control to hardware isolate the vms. All this is doing is giving you assurances that you know, there is security being baked into it. That's it. Most of us aren't going to use this. Honestly, no one's going to pay for it if they don't need it. There is an 85 page technical report. That gets into it. So if you are really, really into engineering, if you're really, really into the deep, deep weeds of hardware hacking and, and you know, VM isolation hacking and you know, cross tenant attacks and stuff, you may want to read this report for me. I'm not going to read this report. There you go. Here's the link to the report. Go check that out. It's 905. I think we're good. Let's do this. Oh my God. Fastest hour in cyber security. I hope you got value from this. Sue me. Who was our first Timer? Soul Shine, C2. First timer. Self Self attested First timer. I hope you guys had fun. I hope you, the regular Simply Cyber community members had a great experience. Shout out to the mods. They were very active today in chat. I'm Jerry from Simply Cyber. Thank you so much. We'll be back tomorrow at 8:00am Eastern Time to roll it back again because you know what we are. Don't go anywhere because I'm going to do everything in my power to answer as many questions as I can in the next 25 minutes with my boy Jerry Guy. Episode 1066 2-11-2 a CPE Daily Cyber Threat brief. Thank you. Until next time, stay secure. Ever wonder what it takes to break into cyber security? Join us every weekday for Jawjacking, where industry experts answer your burning questions about the cyber security field live, unfiltered and totally free. Let's level up together. It's time for some jawjacking. Yo, what's up everybody? Welcome to the potty. My Name's Jerry Guy. 1.9 thumbs, a smile, some glasses coming. Hot off the heels of the daily Cyber threat Brief hosted by that nerd. Oh my God. Dr. Ozier, why are you not reading an 85 page deep dive engineering report? You absolute nerd. I'm the cool guy here at Simply Cyber. If Simply Cyber was a mullet, I would be the back part. Dr. Gerald is the front part. Let's get into it. If you have questions, I have answers. If I don't have the answer, I have friends that have answers. And I will get that for you. What can I do for you? Put your questions in chat with a Q up front. I'll lead off, I'll lead off with the first question. Jerry Guy, how's the Open Claw implementation going? Oh, thanks for asking. All right, so check it out. I've been rolling out Open Claw. I wiped a Mac, a Mac Mini last Friday. On Monday I hardened the crap out of the environment on Tuesday. Yesterday I installed Open Claw. So I have Open Claw running. I actually I, I, I'm not going to get into all the hardening but basically there, the, the AI has its own non privbed user account on the Mac Mini. Also I created a like, you know, Google workspace because I, I use Google Workspace or simply Cyber. I created its own user account in Google Workspace so it has its own email, it has access to, you know, those resources and stuff. And right now the big challenge is getting the API key to work. So right now the, the Open Claw doesn't have access to a AI LLM basically so it's stupid right now. And I have API keys for anthropic and for some reason it's not, it's, it's like not seeing it somehow. So I don't know. I'm, that's currently where I'm at. I'm getting into it. But I am cautiously optimistic. I did tell Tyler Ramsby yesterday what I was up to and he asked me, what's my use case? How am I going to use it? First, I don't have a good use case yet. It's one of those ones where, you know, it's very hot, everyone's talking about it. I want to understand it better and instead of reading about it, I'm going to stand it up and I'm going to play with it and experience it and see what I can do with it. All right, here we go. Here we go. So I'M looking at. Chat really quickly. All right, Mark King. Hey, Jerry, Caught the video of Wade Wells and yourself setting up Clawbot. Would love to see you produce more content on this topic. Can you recommend someone or training? No, Mark King, I can't recommend yet. I will tell you. Let me, let me, let me show you this really quickly. I've seen there's a lot of YouTube content creators out there making like Clawbot content. Okay, I, I like this guy. I do like this guy. I can recommend this guy. Okay, this guy right here, Matthew Berman. I, I do like him. Okay. What I will tell you is I, I can't attest that this guy is showing you how to deploy Claude Open claw securely or anything like that. All I know is like I've watched several different YouTubers. I like that guy's like, he seems like legit and genuine and all these other things. What I want to tell people is I've watched a lot of different YouTubers around open claw. A lot of them are basically like wholesale spamming. How to set it up with vpss, which is fine, but then it's all, it's all affiliate marketing. Like, here's how you set it up. Click here and basically use my code and like it. It just feels like unfortunate. For better or worse, it feels like there's a saturation of low quality bull crap affiliate and, and you know, just be mindful of that. Okay? All right, have a good one. Larry Shervington S. Cole07. How do you stay consistent when working and balancing life, work, labs, etc? I mean, Esco 07, you know, it's all about prioritization. I, I use a lot of checklists. I do want to point out, like I get this question a lot. I want people to remember, like there are sacrifices. Okay? So if you're a friend with me in real life, then you're probably aware how difficult it is to hang out with me. Not, not like I suck to hang out with. It's just I'm very difficult to pin down. Like my friends, my friends joke that like in order to like make lunch plans with me, they have to make it like six weeks in advance. And so work is important to me, right? Because I get, I, I have to fund my life. Work is important to me. I take a lot of pride in my work and my family is very important to me. So like, you know, I forget what the list is. But like there's seven Fs I think, like friends, family, faith, financial or something. Like whatever it is. Like you have to make Compromises. Okay. And, and what I have compromised on is my social, social relationships and social experiences. Like I don't go out very often and do things because my day is I get up at 6.30am, I work until 6pm and then I go in the house and like do dinner or do, you know, family things. I do family stuff basically until like 9:30 and then I chill out for half hour. Like I take 30 minutes from me so that you know, that's how I maintain it is that I make compromises and then I prioritize the things I need to. I, I can tell you definitively. Casually Joseph is wants to shake a fist at the sky when he tries to make plans to play magic with me. Casually Joseph says he lives 30 minutes from me and it takes longer to get a hold of a Microsoft support engineer than to hang out with me. All right. Justin Godwin says my girlfriend's excited to start the GRC masterclass. Okay, cool. With my experience in cyber, how do I keep her motivated and mentor as I do? Experience in cyber but she has zero tech experience. I mean you can do a couple things. One you can set up like a reward system. So every time she finishes a mod like you could. Here's my first thought, Justin, if you want you could set up like an like an advent calendar type thing with like five hidden prizes and every time she finishes a module she gets to open one of them. And I'm not saying you put like a diamond in one and a gold necklace in another and the key to a BMW in the third but like you know, a little chocolate or you know, a lotion or you know like just kind of like a little in reward incentive program. That could be it as a good way to keep her motivated. You could take the class alongside with her. So it's like you know, even though you probably know what's going on, it could be like a mutual like not a date experience but like you know, you're experiencing it together. Toy Toyanala. Good to see you. Toy Nala. Toy Nala says how best can a sock analyst improve on speed when investigating alerts? Also, is there any platform you can recommend that provides hands on experience for sock. Thank you. Yeah. So a couple things, I'll share these with you. I have done deals with these businesses in the past but I'm not currently sponsored by them or anything like that. Just to kind of qualify what I'm about to say. So hack the box. Cdsa. This right here, I've heard good things about. This is a certificate Program. But I've heard. I've heard that this is a pretty solid security operations analyst experience. Okay? Also, let's defend this right here. They actually have, like. Like a. They have a platform that has, like, a sim and you get ticketing and you open tickets, and then you work through the tickets using SIM and EDR logs and stuff. So, like, very much like a sock analyst experience. KC7. KC7 is a big. This one's quite popular with a lot of people. I know, I know Dan Reardon loves this one. This might be the first place to start. Toyina, Toyonala and everybody. Those three platforms are pretty good. Now, as far as improving speed when investigating, you know, for the SOC analyst in chat, please comment. I'm a sock analyst, and here's how to do it. Honestly, toy and all, I think speed just comes with experience. I, I think you just need time in the. The repetitions. You know what I mean? Casually, Joseph's been doing sock work for a minute, and he. I think he's gotten faster at it. I know Dan Reardon's been doing sock work and getting faster at it. I. I really think speed is just getting comfortable with essentially seeing the same things over and over and over and over again and knowing, like, okay, like, this is click fix. I'm gonna go here, here, and here. I'm gonna do this, this, and this. Done right, like, almost like starting to develop your own runbooks. Angular says you answered past. You've answered past many times. I was told over the weekend, it's not what you know, it's who you know. If you are not on management's radar, how do they get. How do you get their attention? Yeah. So it's. Well, I, I shouldn't say it's not what you know, it's who you know. You do have to know some things. Like, you can't. Unless you're like, the CEO's kid or, you know, you're. You're juiced in because of money and all these power relationships, right? Like the, The. The mom from oh, my God, Full House, the Uncle Jesse's wife, like, how she was sending her kids to Stanford and, like, they weren't really qualified to go to Stanford. Like, those exceptions. You do have to know what's going on. But you know what? Who you know is important because, yes, for better or worse, we do not live in a meritocracy. And if management has a problem and they're thinking, how can they solve it? They're gonna think, oh, like, we should. Like, this person can do It. Let's move on. Couple things. Angular, you want to be the person that people talk about when you're not in the room in a good way. How do you get on management's radar? My opinion of this, it's not like a transactional activity that you do. It's much more around being consistent of, you know, volunteering for certain things, taking initiative, being a little bit more proactive, but, but making management aware you're doing it right. Nothing's worse than like busting your hump. There's a lot of people that do this, by the way. You bust your hump and then like your boss takes credit for your work or you bust your hump and a co worker takes credit for your work. And then management, their perception is, oh, your co worker did all this stuff, that's great. It's no different than when you were in high grade school, high school, you're on a group project and like, you got that one person on your team who sucked and they get the A. Also, like, you don't have to throw them under the bus. But, but, you know, take, take. I don't want to say take pride, but take ownership of your work. Make management aware. Like, hey, you know, yeah, Lori Loughlin, I think her name was like, Angular. You could be like, hey, manager or whatever. First of all, let them know that you're interested in either promotion, management track, getting access to more responsibility, like, whatever it is. Like, literally tell them so they know that. But then demonstrate value to the organization. And, and when I say demonstrate it, do it, but then make sure that they know that you're doing it. Okay, so you can subtly bring these up in meetings. Like, let's say that. Let me think of an example. Like, like, I'll just give you a silly example, but it makes sense, right? So you're. I worked at a medical university. No one asked me, no one asked me to go look at the wireless network and see if there was any unencrypted sensitive communications. So what I did was I thought it would be cool to buy an SD radio antenna. I hooked it up to my computer, I got a scanner and I basically went to the hospital and I stood it up and I. What I discovered was a lot of physicians have pagers. Okay, so in Gen Z, go Google it. But for whatever reason, pagers are still used quite a bit in healthcare situations for basically redundancy, speed of messaging, etc, and I was able to sniff the traffic and discover sensitive communication. Sensitive information was being transmitted. Okay. No one asked me to do this. So then I went back, wrote a report, and then next opportunity I had with the CISO at the time, I brought it to their attention, and I said, hey, listen, you know, I did all my regular work, but I also thought that this could be an issue. I investigated it using these techniques, and I discovered that we do have an issue here. And I have thought of how we might resolve it. I've reached out to the key people who are responsible for the communication system, and I've talked through what's going on. So, like, I'm not bringing problems to the ciso. I have brought a problem and explained how I'm working to resolve it. So I look like a superstar. So angular 777. That's a way to do it. Okay. Michael Fang, planning to attend Simply Cybercon. What are your feelings about Mill? Have to play my commander deck before lodging. Okay. So Simply Cybercon. Justin Crypto. Can we get together today? By the way, Jay Crypto. I wanted to talk to you about Simply Cybercon. Michael Fink. Here's my thing. I am firmly in the camp that Let it go, man. I like to me, no one's gonna. I mean, whatever. I will play. I will play magic the gathering in a way that makes the table happy. But I am firmly in the camp of there's no rules. I. I think, like, I. I'm fine with banned cards. I'm fine with two card combos. I'm fine with mill. If you can beat me, beat me. Dude, I don't care. Lock me out of the game. I'll go get a beer. I'm firm. There's nothing you can do that's gonna piss me off because I want to play the things that I get excited about. If I sit down with a table and someone's like, all right, listen, rule zero. You can't do these things. I've got to be able to do my thing. You can't win. Win until turn seven. Okay, whatever. So, Millet. Yeah. Casually Joseph loves himself some mill. Terrence, can you do a video on steps you take to harden your Mac and home network? Teren. Possibly making a video like that is very time consuming because I basically have to do it all, then reverse and then film it all. So potentially, Terence, I'm trying to get the open claw up and running. I'm so mad about the stupid API key. Okay. Continuing to look through chat for questions. I was war walking the hospital. I was war walking the hospital. I thought it was so cool. There we go. So Adam is offering why the pagers Work longer distance, modern cellular. Etc. How's the thumb? Space Tacos is asking. It's pretty good. Replacing the bandages every two days. It's still sensitive. It still looks disgusting. So I won't be showing it on stream anytime soon. But yeah, we're on the road to recovery. Thank you. Space tacos. I'm still showering. Like I'm asking a question in third grade. I'm caught up on chat right now. Okay, jay, crypto's dms are open. Okay, okay, okay. All right, so if you got questions, you're listening to Jawjacking or you're watching Jawjacking. This is a 30 minute cyber security AMA. I'm Dr. Gerald Oer. I've got 20 years of experience, a ton of education. I love helping people. I love cyber security. I cannot do one on one coaching or. Or one on one. I can't do one on one anything. But what I can do is mentor at scale. Which is why we have the Jawjacking segment. Hey, for those who are in really quickly, if you live in San Francisco, I know Phil and Elliot and a couple others. I had someone message me saying that they were going to rsa. They wanted to know about a simply Cyber meetup. Phil and Elliot, I got in Airbnb and it's right around the corner from a place called Irish Bank. I don't know if we can go to Irish bank, but. And I've never been to Irish bank, but this place in San Francisco called Irish bank looks like it's a thousand percent my vibe. It is like an Irish public house. It's down an alley. It looks cool. Let me know. Let me know if we could do that, if that makes sense. Or not. Asking for a friend. Jerry, do you have a mixtape? Thought you had a link for one. I do. Legrat. It's actually this QR code. Whoops. This QR code right here goes to my playlist, but I. I'll just, I'll share it in chat right now. Okay, really quickly, if you didn't know, this is the playlist. Simply Cyber hip hop mixtape. Okay. I made this playlist and I'm going to drop a link in chat. My mixtape. Okay, starts off with tribe, Set the mood. Got some things. Digable Planets in here. Outcast for sure. The Roots. Love the Roots. Fun fact, you may not know. I have seen the Roots in concert more than any other group. All right. Oh, thanks, Stones fan. All right, so Kyle. Kyle. I started to get asked to speak up about threat trends during ISAC calls and local cyber collab. Group calls. Do you have any tips to get asked to do more? Yeah, Kyle, Kyle. What I would do. You know, I'm a big control freak, in case you guys didn't know. It's. It's probably one of the worst kept secrets. Don't ask casually, Joseph. I'm a control freak, very type A. Which is. Which is why I. I've been working on getting better at delegating. But what I would do in that instance. Kyle, since you want to do more, whoever's asked you to speak up on the ISAC calls or local cyber collaboration groups, reach out to them and tell them you have something that you want to share. Listen, as someone who's organized meetups and monthly meetings and conferences, if someone comes to me and says, hey, I want to talk about this, yes, thank you for helping me. So I. Kyle, Kyle. What I would recommend, just as an example. Okay. And I don't know your current situation, but as an example, I thought this story today during the daily Cyber Threat brief was awesome. Okay. North Korea hacker, deep fakes crypto exec, compromised Telegram credentials. Click fix this had a little bit of everything for everyone. All right? I actually suggested that you take this and. And bundle it up into a nice message for your executives and for your end users. This is a perfect one. Bundle it up and make it like a share for one of these group calls or group meetups. Right? And then reach out to them and say, hey, listen, North Korea just did this really sophisticated, elegant hack. It could affect a lot of executives. Real money was stolen. I want to. I want a brief the group on this particular attack. They're going to say yes. So what I would say, Kyle, is to get at. Don't get. I guess here's the trick. I'm going to rephrase your question, like, frame it differently. Don't ask for tips on how to get asked to do more. I'm giving you tips on how you can take action and initiative to speak more on these calls. You don't need to get asked. Offer, Offer. 929. Couple more minutes here. Adam wants a. A link to the EPSS lookup tool. Sure. Here you go, Adam. All right, next question. Stones fan, Jerry. Ever seen King Gizzard and the Lizard Wizard? No. Is that a band? King Gizzard? It is a rock band. No, I haven't seen them. Okay, so we got a recommendation for King Gizzard and the Lizard Wizard. I like the name. Francis. Who asked one of these questions earlier? Is CySA plus or Pen Test Plus a better cert after Pen Test Plus. Well, I don't know if this is a trick question, Francis, but, like, if you already have the Pen Test plus, I would not get it again. So in this. This question on stream right here, Cysa plus is 100% better than the Pen Test plus after getting the Pen Test Plus. Now, you asked this question at the beginning, so I think you meant SEC plus. So is Cysa plus or Pen Test plus better after SEC plus? What I would tell you is the answer is this. If you want to become a SOC analyst, CySA plus is better. If you want to become an offensive security penetration tester, Pen Test plus is better. So depending on what path you want to take, depends on it will decide the answer. So they're both fine. One will help you towards sock analysts. One will help you towards pen tester. All right. Cody is saying the band is good, you know, just to offer one more. Trying to think here. There is a bear. There's a DJ named Grizz that did some collaborations. That was like, I wish I could remember who. Who Grizz did a. Anyways, yeah, there's a group called a DJ called Grizz that I got into right before I got into the midnight. That's worth checking out. You're welcome, Francis. All right, guys, I'm gonna get out of here. I'm gonna go fight Open claw again. We'll see how it goes. Thank you to the mods. If you're a squad member, please open your emote tray and spam that mod button. Give the mod some love. Thank you so much again. Thank you guys for attending the Daily Cyber Threat Brief, Simply Cyber's Daily Cyber Threat Brief and the Jawjacking. Appreciate this, community. Today is Wednesday. Just a reminder that tomorrow is simply Cyber Firesides. We do the firesides every Thursday. We're talking shadow AI. I'm leaning into AI governance in 2026. So if you want to hear about it, come check this out. This. I'm. I'm partnering with area on this particular firesides. This guy is a Pratik Doshi, is definitely very savvy on AI governance. So I want. I want you guys to get value, get educated on AI governance. I'm also asking you, as you know, from the community perspective to come check this out. It is a sponsored fireside, so, you know, engagement. I want you to get value, but also it supports the channel. So I want to say thank you, everybody. Jay Gold, I'll get with you later tonight or this afternoon for Simply Cybercon. I'm Jerry from Simply Cyber. Until next time, stay secure.