How to Vet a Security Researcher's Credibility With These 6 Rules [YouTube Release]

Additional Resources:

Connecting With Us

Lawrence Systems Shirts and Swag



Amazon Affiliate Store
:shopping_cart: Lawrence Systems's Amazon Page

All Of Our Affiliates that help us out and can get you discounts!

Gear we use on Kit
:shopping_cart: Kit

Use OfferCode LTSERVICES to get 10% off your order at
:shopping_cart: Tech Supply Direct - Refurbished Tech at Unbeatable Prices

Digital Ocean Offer Code
:shopping_cart: DigitalOcean | Cloud Hosting for Builders

HostiFi UniFi Cloud Hosting Service
:shopping_cart: HostiFi - UniFi Cloud Hosting

Protect you privacy with a VPN from Private Internet Access
:shopping_cart: Buy VPN with Credit Card or PayPal | Private Internet Access

:moneybag: lawrencesystems | creating Tech Tutorials & Reviews | Patreon

Time Stamps
00:00 - How to Vet a Security Researcher’s Credibility With These 6 Rules
02:44 - Lean on their credentials not their accomplishments
04:54 - History of Making Vague “Big Thing Coming Soon” Claims
06:56 - Does not have any evidenced based history of write ups & findings
11:20 - Making claims about having disclosed security issues without any proof
14:17 - Claims to be an insider at other large cybersecurity companies
16:09 - Repeating the same class of exploit and claiming it’s new

#security #cybersecurity