cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
rslade
Influencer II

If you are going to be a cybersecurity advisor ...

... it's possibly best to know at least a little tiny bit about what you are saying.

 

(Failing that, of course, you could always just shut up ...)

 

(This post has minimal editorial content in order to avoid making a "controversial political statement.")

 

(For the original postings, and various short commentary, see here.)


............

Other posts: https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413

This message may or may not be governed by the terms of
http://www.noticebored.com/html/cisspforumfaq.html#Friday or
https://blogs.securiteam.com/index.php/archives/1468
11 Replies
HTCPCP-TEA
Contributor I

Very sound advice from @CISOScott

 

I often find the best way to validate my own knowledge is when I attempt to teach or indeed participate in discussions/consultations. I also find that the knowledge I lack or things I have forgotten often get pointed out by those being taught or indeed those I have conversations with.

 

It's always best to be honest, say that you can't recall or indeed do not know, research the topic (or refresh on it) and go back to the person who was kind enough to point out your shortcomings.

 

But going back to the original post, I would agree with @rslade. If you don't know what you are preaching about, don't preach. It will only lead to some sort of issue, either for you or the intended recipient.

rslade
Influencer II

> Curiousmind18 (Newcomer II) posted a new reply in Industry News on 01-06-2019

> But the problem is that people whom don't understand,
> don't hire people that do

If you can tell the difference between good advice and bad advice, you don't need
any advice ...

====================== (quote inserted randomly by Pegasus Mailer)
rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org
In short, just as the Multics mentality of careful access
controls shows up throughout Unix, the cretinous CP/M mentality
of uncontrolled havoc shows up in DOS and all its mutant children
- Tom Christiansen
victoria.tc.ca/techrev/rms.htm http://twitter.com/rslade
http://blogs.securiteam.com/index.php/archives/author/p1/
https://is.gd/RotlWB

............

Other posts: https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413

This message may or may not be governed by the terms of
http://www.noticebored.com/html/cisspforumfaq.html#Friday or
https://blogs.securiteam.com/index.php/archives/1468