Tedi Heriyanto

Information Security

Tedi Heriyantotedi@infosec.exchange
2025-05-20

Exploring Cybersecurity Career Paths and How They Work Together: dispatch.thorcollective.com/p/

#cybersecuritycareer

Tedi Heriyantotedi@infosec.exchange
2025-05-20

Bit ByBit - emulation of the DPRK's largest cryptocurrency heist: elastic.co/security-labs/bit-b

#detectionscience #attackpattern

Tedi Heriyantotedi@infosec.exchange
2025-05-20
Tedi Heriyantotedi@infosec.exchange
2025-05-04
Tedi Heriyantotedi@infosec.exchange
2025-05-04

A three-part series focused on optimizing security operations for long-term success:

- Part 1: Building and Leading Security Operations: The Infinite Quest: sans.org/blog/building-and-lea

- Part 2: It’s Dangerous to Go Alone: A Consensus-Driven Approach to SOC Metrics:
sans.org/blog/its-dangerous-to

#soc #cybersecurityleadership

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst