How to Vet a Security Researcher's Credibility With These 6 Rules [YouTube Release]

Additional Resources:

Connecting With Us

Lawrence Systems Shirts and Swag

►👕 Lawrence Systems

AFFILIATES & REFERRAL LINKS

Amazon Affiliate Store
:shopping_cart: Lawrence Systems's Amazon Page

All Of Our Affiliates that help us out and can get you discounts!
:shopping_cart: https://www.lawrencesystems.com/partners-and-affiliates/

Gear we use on Kit
:shopping_cart: Kit

Use OfferCode LTSERVICES to get 10% off your order at
:shopping_cart: Tech Supply Direct - Premium Refurbished Servers & Workstations at Unbeatable Prices

Digital Ocean Offer Code
:shopping_cart: DigitalOcean: AI-Powered Unified Inference Cloud Infrastructure

HostiFi UniFi Cloud Hosting Service
:shopping_cart: HostiFi - Fast and Reliable UniFi in the Cloud

Protect you privacy with a VPN from Private Internet Access
:shopping_cart: https://www.privateinternetaccess.com/pages/buy-vpn/LRNSYS

Patreon
:money_bag: https://www.patreon.com/lawrencesystems

Time Stamps
00:00 - How to Vet a Security Researcher’s Credibility With These 6 Rules
02:44 - Lean on their credentials not their accomplishments
04:54 - History of Making Vague “Big Thing Coming Soon” Claims
06:56 - Does not have any evidenced based history of write ups & findings
11:20 - Making claims about having disclosed security issues without any proof
14:17 - Claims to be an insider at other large cybersecurity companies
16:09 - Repeating the same class of exploit and claiming it’s new

#security #cybersecurity