Taggart :donor: on Nostr: Tell you a secret about red team #cybersecurity work: Almost everyone wants to ...
Tell you a secret about red team #cybersecurity work:
Almost everyone wants to pretend to be a red teamer; almost nobody has the willingness to put in the real work to become one.
[Responsible Red Teaming](
https://taggartinstitute.org/p/responsible-red-teaming ) is
The Taggart Institute (npub1mgl…z233) 's most enrolled course by a wide margin.
It is also the least-completed.
The course content is not more technical than any other offensive security course. Indeed, most of it is far less, instead requiring you to think about the human impact of the work. This course discusses how to operate in a safe, appropriate manner. It is not about popping shells.
Once most folks discover this, they bail.
If you want to do offensive security solely because you want to "hack stuff," you're a liability. You must understand your role in hardening defenses and working with defenders to improve operational security.
The job is not a CTF. If you can't hack *that*, please find another line of work.
Published at
2024-12-07 19:53:26Event JSON
{
"id": "90bf572f9f59afb4a9b9ed3a7a52f655faa1f6424c3eaa6b593beef0007c3f81",
"pubkey": "220ff9f42ec1c846bf7154b09687d651eeedc18b8031428e12d374d7ee3b24c1",
"created_at": 1733601206,
"kind": 1,
"tags": [
[
"t",
"cybersecurity"
],
[
"p",
"da3e681142f8ad0bd8e7f6af49228ece91c598e87729a4f17d8b862a85bb39e9"
],
[
"proxy",
"https://infosec.exchange/@mttaggart/113613288672673203",
"web"
],
[
"proxy",
"https://infosec.exchange/users/mttaggart/statuses/113613288672673203",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/mttaggart/statuses/113613288672673203",
"pink.momostr"
],
[
"-"
]
],
"content": "Tell you a secret about red team #cybersecurity work:\n\nAlmost everyone wants to pretend to be a red teamer; almost nobody has the willingness to put in the real work to become one. \n\n[Responsible Red Teaming](https://taggartinstitute.org/p/responsible-red-teaming ) is nostr:npub1mglxsy2zlzkshk8876h5jg5we6gutx8gwu56futa3wrz4pdm885s4ez233 's most enrolled course by a wide margin.\n\nIt is also the least-completed. \n\nThe course content is not more technical than any other offensive security course. Indeed, most of it is far less, instead requiring you to think about the human impact of the work. This course discusses how to operate in a safe, appropriate manner. It is not about popping shells.\n\nOnce most folks discover this, they bail.\n\nIf you want to do offensive security solely because you want to \"hack stuff,\" you're a liability. You must understand your role in hardening defenses and working with defenders to improve operational security. \n\nThe job is not a CTF. If you can't hack *that*, please find another line of work.",
"sig": "e32f27b698b603bba7d25593ab541081989b3c3df4df823ddff879d23060a3e164ac12de56cedaea5fa5fbae5ab64bc358fc600355a5b26754544bf77acd6a26"
}