René's URL Explorer Experiment


Title: Gustavo Picón - NVIDIA | LinkedIn

Open Graph Title: Gustavo Picón - NVIDIA | LinkedIn

X Title: Gustavo Picón - NVIDIA | LinkedIn

Description: Experience: NVIDIA · Location: Greater Seattle Area · 500+ connections on LinkedIn. View Gustavo Picón’s profile on LinkedIn, a professional community of 1 billion members.

Open Graph Description: Experience: NVIDIA · Location: Greater Seattle Area · 500+ connections on LinkedIn. View Gustavo Picón’s profile on LinkedIn, a professional community of 1 billion members.

X Description: Experience: NVIDIA · Location: Greater Seattle Area · 500+ connections on LinkedIn. View Gustavo Picón’s profile on LinkedIn, a professional community of 1 billion members.

Opengraph URL: https://www.linkedin.com/in/gpicon

X: @Linkedin

direct link

Domain: www.linkedin.com


Hey, it has json ld scripts:
      {"@context":"http://schema.org","@graph":[{"@type":"WebPage","reviewedBy":{"@type":"Person","name":"Gustavo Picón"},"url":"https://www.linkedin.com/in/gpicon"},{"@context":"http://schema.org","@type":"Person","address":{"@type":"PostalAddress","addressCountry":"US","addressLocality":"Greater Seattle Area"},"alumniOf":[{"@type":"EducationalOrganization","name":"**** ********** *********","member":{"@type":"OrganizationRole","description":"**** ******","endDate":"2023-06"}}],"awards":[],"disambiguatingDescription":"","image":{"@type":"ImageObject","contentUrl":"https://media.licdn.com/dms/image/v2/C4E03AQGf_ous-ebwfw/profile-displayphoto-shrink_200_200/profile-displayphoto-shrink_200_200/0/1516299890270?e=2147483647&v=beta&t=nveUlRJKbsgM2oavwMO9G907PlDjZNzXjsGSj5c66zY"},"jobTitle":["********","********","********","********","********"],"knowsLanguage":[{"@type":"Language","name":"English"},{"@type":"Language","name":"Spanish"}],"memberOf":[],"name":"Gustavo Picón","sameAs":"https://www.linkedin.com/in/gpicon","url":"https://www.linkedin.com/in/gpicon","worksFor":[{"@type":"Organization","name":"NVIDIA","url":"https://www.linkedin.com/company/nvidia","location":"Santa Clara, California, United States","member":{"@type":"OrganizationRole"}},{"@type":"Organization","name":"******","location":"San Francisco Bay Area","member":{"@type":"OrganizationRole"}},{"@type":"Organization","name":"******","location":"Palo Alto, CA","member":{"@type":"OrganizationRole"}},{"@type":"Organization","name":"**********","location":"Brooklyn, New York, United States","member":{"@type":"OrganizationRole"}},{"@type":"Organization","name":"****","location":"Brooklyn, New York, United States","member":{"@type":"OrganizationRole"}}],"interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/FollowAction","name":"Follows","userInteractionCount":816}}]}
    

pageKeypublic_profile_v3_desktop
bingbotmax-image-preview:large, archive
linkedin:pageTagopenToProvider
localeen_US
al:android:urlhttps://www.linkedin.com/in/gpicon
al:android:packagecom.linkedin.android
al:android:app_nameLinkedIn
al:ios:urlhttps://www.linkedin.com/in/gpicon
al:ios:app_store_id288429040
al:ios:app_nameLinkedIn
litmsProfileNamepublic-profile-frontend
ubbahttps://static.licdn.com/aero-v1/sc/h/38k9mj3cvikmihkcx9uvp3bqc
platformhttps://static.licdn.com/aero-v1/sc/h/1ny8qa2mxece9t1gr32iph525
platform-workerhttps://static.licdn.com/aero-v1/sc/h/7nirg34a8ey4y2l4rw7xgwxx4
og:imagehttps://media.licdn.com/dms/image/v2/C4E03AQGf_ous-ebwfw/profile-displayphoto-shrink_200_200/profile-displayphoto-shrink_200_200/0/1516299890270?e=2147483647&v=beta&t=nveUlRJKbsgM2oavwMO9G907PlDjZNzXjsGSj5c66zY
og:typeprofile
profile:first_nameGustavo
profile:last_namePicón
twitter:cardsummary
twitter:imagehttps://media.licdn.com/dms/image/v2/C4E03AQGf_ous-ebwfw/profile-displayphoto-shrink_200_200/profile-displayphoto-shrink_200_200/0/1516299890270?e=2147483647&v=beta&t=nveUlRJKbsgM2oavwMO9G907PlDjZNzXjsGSj5c66zY
clientSideIngraphs1

Links:

Skip to main content https://www.linkedin.com/in/gpicon/#main-content
LinkedIn https://www.linkedin.com/?trk=public_profile_nav-header-logo
Top Content https://www.linkedin.com/top-content?trk=public_profile_guest_nav_menu_topContent
People https://www.linkedin.com/pub/dir/+/+?trk=public_profile_guest_nav_menu_people
Learning https://www.linkedin.com/learning/search?trk=public_profile_guest_nav_menu_learning
Jobs https://www.linkedin.com/jobs/jobs-in-ogden-ut?trk=public_profile_guest_nav_menu_jobs
Games https://www.linkedin.com/games?trk=public_profile_guest_nav_menu_games
Get the app ms-windows-store://pdp/?ProductId=9WZDNCRFJ4Q7&mode=mini&cid=guest_nav_upsell&trk=public_profile_guest_nav_menu_windows
Join now https://www.linkedin.com/signup/public-profile-join?vieweeVanityName=gpicon&session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fgpicon&trk=public_profile_nav-header-join
Sign in https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Fin%2Fgpicon&fromSignIn=true&trk=public_profile_nav-header-signin
https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Fin%2Fgpicon&fromSignIn=true&trk=public_profile_nav-header-signin
Forgot password?https://www.linkedin.com/uas/request-password-reset?trk=csm-v2_forgot_password
Join nowhttps://www.linkedin.com/signup/public-profile-join?vieweeVanityName=gpicon&trk=public_profile_logo_cta_contextual-sign-in-modal_join-link
User Agreementhttps://www.linkedin.com/legal/user-agreement?trk=linkedin-tc_auth-button_user-agreement
Privacy Policyhttps://www.linkedin.com/legal/privacy-policy?trk=linkedin-tc_auth-button_privacy-policy
Cookie Policyhttps://www.linkedin.com/legal/cookie-policy?trk=linkedin-tc_auth-button_cookie-policy
Forgot password?https://www.linkedin.com/uas/request-password-reset?trk=csm-v2_forgot_password
Join nowhttps://www.linkedin.com/signup/public-profile-join?vieweeVanityName=gpicon&trk=public_profile_mutual-connections_contextual-sign-in-modal_join-link
User Agreementhttps://www.linkedin.com/legal/user-agreement?trk=linkedin-tc_auth-button_user-agreement
Privacy Policyhttps://www.linkedin.com/legal/privacy-policy?trk=linkedin-tc_auth-button_privacy-policy
Cookie Policyhttps://www.linkedin.com/legal/cookie-policy?trk=linkedin-tc_auth-button_cookie-policy
Join to view profile https://www.linkedin.com/signup/public-profile-join?vieweeVanityName=gpicon&trk=public_profile_top-card-primary-button-join-to-view-profile
NVIDIA https://www.linkedin.com/company/nvidia?trk=public_profile_topcard-current-company
Universidad de Lima https://pe.linkedin.com/school/ulima/?trk=public_profile_topcard-school
Personal Website https://www.linkedin.com/redir/redirect?url=https%3A%2F%2Ftabo%2Epe%2F&urlhash=ZJvD&trk=public_profile_topcard-website
Report this profile https://www.linkedin.com/uas/login?fromSignIn=true&session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fgpicon&trk=public_profile_ellipsis-menu-semaphore-sign-in-redirect&guestReportContentType=PROFILE&_f=guest-reporting
Forgot password?https://www.linkedin.com/uas/request-password-reset?trk=public_profile_sign-in-modal_forgot_password
User Agreementhttps://www.linkedin.com/legal/user-agreement?trk=public_profile_sign-in-modal_auth-button_user-agreement
Privacy Policyhttps://www.linkedin.com/legal/privacy-policy?trk=public_profile_sign-in-modal_auth-button_privacy-policy
Cookie Policyhttps://www.linkedin.com/legal/cookie-policy?trk=public_profile_sign-in-modal_auth-button_cookie-policy
Join nowhttps://www.linkedin.com/signup/public-profile-join?vieweeVanityName=gpicon&trk=public_profile_sign-in-modal_join-link
User Agreementhttps://www.linkedin.com/legal/user-agreement?trk=public_profile_auth-button_user-agreement
Privacy Policyhttps://www.linkedin.com/legal/privacy-policy?trk=public_profile_auth-button_privacy-policy
Cookie Policyhttps://www.linkedin.com/legal/cookie-policy?trk=public_profile_auth-button_cookie-policy
https://www.linkedin.com/company/offsec-training?trk=public_profile_profile-section-card_image-click
OffSec Certified Expert 3 (OSCE3) https://www.credential.net/05fcf8b1-7956-40bd-b4cb-9ca90ff63afc?trk=public_profile_certification-title
OffSec https://www.linkedin.com/company/offsec-training?trk=public_profile_profile-section-card_subtitle-click
See credential https://www.credential.net/05fcf8b1-7956-40bd-b4cb-9ca90ff63afc?trk=public_profile_see-credential
https://www.linkedin.com/company/offsec-training?trk=public_profile_profile-section-card_image-click
OffSec Web Expert (OSWE) https://www.credential.net/f0540d21-21e3-430e-adbf-9e0964087934?trk=public_profile_certification-title
OffSec https://www.linkedin.com/company/offsec-training?trk=public_profile_profile-section-card_subtitle-click
See credential https://www.credential.net/f0540d21-21e3-430e-adbf-9e0964087934?trk=public_profile_see-credential
https://www.linkedin.com/company/offsec-training?trk=public_profile_profile-section-card_image-click
OffSec Experienced Penetration Tester (OSEP) https://www.credential.net/301f1659-5fc1-450c-9783-84dc1c685a41?trk=public_profile_certification-title
OffSec https://www.linkedin.com/company/offsec-training?trk=public_profile_profile-section-card_subtitle-click
See credential https://www.credential.net/301f1659-5fc1-450c-9783-84dc1c685a41?trk=public_profile_see-credential
https://www.linkedin.com/company/offsec-training?trk=public_profile_profile-section-card_image-click
Offensive Security Exploit Developer (OSED) https://www.credential.net/e00856d4-5c7e-4e63-bd8c-61a242080eac?trk=public_profile_certification-title
Offensive Security https://www.linkedin.com/company/offsec-training?trk=public_profile_profile-section-card_subtitle-click
See credential https://www.credential.net/e00856d4-5c7e-4e63-bd8c-61a242080eac?trk=public_profile_see-credential
https://www.linkedin.com/company/offsec-training?trk=public_profile_profile-section-card_image-click
Offensive Security Certified Professional (OSCP) https://www.credential.net/3574c006-6b64-4cb0-bd6a-0b9eb5e7373a?trk=public_profile_certification-title
Offensive Security https://www.linkedin.com/company/offsec-training?trk=public_profile_profile-section-card_subtitle-click
See credential https://www.credential.net/3574c006-6b64-4cb0-bd6a-0b9eb5e7373a?trk=public_profile_see-credential
https://www.linkedin.com/company/amazon-web-services?trk=public_profile_profile-section-card_image-click
AWS Certified Developer - Associate https://www.certmetrics.com/amazon/public/transcript.aspx?transcript=27GEB61CKNR41SKJ&trk=public_profile_certification-title
Amazon Web Services https://www.linkedin.com/company/amazon-web-services?trk=public_profile_profile-section-card_subtitle-click
See credential https://www.certmetrics.com/amazon/public/transcript.aspx?transcript=27GEB61CKNR41SKJ&trk=public_profile_see-credential
https://www.linkedin.com/company/amazon-web-services?trk=public_profile_profile-section-card_image-click
AWS Certified Solutions Architect - Associate https://www.certmetrics.com/amazon/public/transcript.aspx?transcript=27GEB61CKNR41SKJ&trk=public_profile_certification-title
Amazon Web Services https://www.linkedin.com/company/amazon-web-services?trk=public_profile_profile-section-card_subtitle-click
See credential https://www.certmetrics.com/amazon/public/transcript.aspx?transcript=27GEB61CKNR41SKJ&trk=public_profile_see-credential
https://uk.linkedin.com/company/portswigger?trk=public_profile_profile-section-card_image-click
Burp Suite Certified Practitioner https://portswigger.net/web-security/e/c/b22c1ebd4b11d945?trk=public_profile_certification-title
PortSwigger https://uk.linkedin.com/company/portswigger?trk=public_profile_profile-section-card_subtitle-click
See credential https://portswigger.net/web-security/e/c/b22c1ebd4b11d945?trk=public_profile_see-credential
https://www.linkedin.com/company/offsec-training?trk=public_profile_profile-section-card_image-click
OffSec Web Assessor (OSWA) https://www.credential.net/b11253e6-1e2c-4a36-9d40-48935e73d267?trk=public_profile_certification-title
OffSec https://www.linkedin.com/company/offsec-training?trk=public_profile_profile-section-card_subtitle-click
See credential https://www.credential.net/b11253e6-1e2c-4a36-9d40-48935e73d267?trk=public_profile_see-credential
https://www.linkedin.com/company/offsec-training?trk=public_profile_profile-section-card_image-click
OffSec Wireless Professional (OSWP) https://www.credential.net/01302861-4151-418a-882d-41b1a00a0dfe?trk=public_profile_certification-title
OffSec https://www.linkedin.com/company/offsec-training?trk=public_profile_profile-section-card_subtitle-click
See credential https://www.credential.net/01302861-4151-418a-882d-41b1a00a0dfe?trk=public_profile_see-credential
Join now to see all certifications https://www.linkedin.com/signup/cold-join?session_redirect=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Fin%2Fgpicon%2Fdetails%2Fcertifications&trk=public_profile_see-all-certifications
Michel Floyd 🚀 “Tabo was our first Peruvian offshore developer and he set the stage for us to hire two more pythonistas in Lima. Tabo is simply an incredible developer. He is fast, smart, and incredibly knowledgeable about all things python. Anytime he joins a project he becomes "the man" on it and everyone counts on him. He's had an incredible impact on the architecture of YouGov's systems.” https://www.linkedin.com/in/michelfloyd?trk=public_profile_recommendations
Jj Del Carpio “I can attest he is able to tie his own shoes (and his kid's) even though he seldom wears them.” https://uk.linkedin.com/in/jjdelc?trk=public_profile_recommendations
Join now to view https://www.linkedin.com/signup/public-profile-join?vieweeVanityName=gpicon&trk=public_profile_recommendations
Join to view full profile https://www.linkedin.com/signup/public-profile-join?vieweeVanityName=gpicon&trk=public_profile_bottom-cta-banner
Ketul Mehta https://www.linkedin.com/in/ketulmehta
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fketulmehta&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Michael L. https://vn.linkedin.com/in/michael-luo
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fvn.linkedin.com%2Fin%2Fmichael-luo&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Raju Koushik Gorantla https://in.linkedin.com/in/rajukoushik
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fin.linkedin.com%2Fin%2Frajukoushik&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Arjun Sharma https://www.linkedin.com/in/arjunssharma
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Farjunssharma&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Yiyi Wu https://www.linkedin.com/in/yiyiwu51
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fyiyiwu51&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Roxy(Ruoxuan) Wang https://www.linkedin.com/in/ruoxuanwang1
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fruoxuanwang1&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Rahul Chopra https://www.linkedin.com/in/rahul-chopra-30b5771a
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Frahul-chopra-30b5771a&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Farruh Habibullaev https://www.linkedin.com/in/farruhh
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Ffarruhh&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Cheng-Che(Jake) Lee https://www.linkedin.com/in/cheng-che-jake-lee-68225ba1
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fcheng-che-jake-lee-68225ba1&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Xinwei L. https://www.linkedin.com/in/xinwei-li
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fxinwei-li&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Konstantin Labun https://www.linkedin.com/in/konstantin-labun
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fkonstantin-labun&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Rayhan Hossain https://www.linkedin.com/in/rayhos
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Frayhos&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Dennis Lin https://www.linkedin.com/in/dnslin
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fdnslin&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Jialu Chen https://www.linkedin.com/in/jialu-chen-09a807106
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fjialu-chen-09a807106&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Yu Shu https://www.linkedin.com/in/yushu
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fyushu&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Piyush Kandpal https://www.linkedin.com/in/piyushkandpal
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fpiyushkandpal&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Tao Long https://www.linkedin.com/in/tao-long-769ab3b9
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Ftao-long-769ab3b9&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Jay Shah https://www.linkedin.com/in/jayshah1210
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fjayshah1210&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Barry Liu https://www.linkedin.com/in/lihao--liu
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Flihao--liu&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Viraj Thakur https://www.linkedin.com/in/vt94
View Profile https://www.linkedin.com/login?session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fvt94&fromSignIn=true&trk=public_profile_browsemap_browse-map_connect-button
Tim Callan 6K followers https://www.linkedin.com/in/tim-callan?trk=public_profile_relatedPosts_face-pile-cta
Jason Soroko and I explain the major news items from the most recent CA/Browser Forum face-to-face meeting in Tokyo on the Root Causes Podcast. Topics include MPIC, 47-day certificate term, and Temporary Restraining Orders. Audio: https://lnkd.in/g-RaJifc Video: https://lnkd.in/gDJuyRAg 34 1 Comment https://www.linkedin.com/posts/tim-callan_jason-soroko-and-i-explain-the-major-news-activity-7320608462340554752-9LZv?trk=public_profile_relatedPosts
Brian Krebs 211K followers https://www.linkedin.com/in/bkrebs?trk=public_profile_relatedPosts_face-pile-cta
MITRE has announced that its funding for the Common Vulnerabilities and Exposures (CVE) program and related programs, including the Common Weakness Enumeration Program, will expire on April 16. The CVE database is critical for anyone doing vulnerability management or security research, and for a whole lot of other uses. There isn't really anyone else left who does this, and it's typically been work that is paid for and supported by the US government, which is a major consumer of this information, btw. I reached out to MITRE, and they confirmed it is for real. Here is the contract, which is through the Department of Homeland Security, and has been renewed annually on the 16th or 17th of April. https://lnkd.in/eeUCj7Wu MITRE's CVE database is likely going offline tomorrow. They have told me that for now, historical CVE records will be available at GitHub, https://lnkd.in/e9_TE9hi Yosry Barsoum, vice president and director at MITRE's Center for Securing the Homeland, said: “On Wednesday, April 16, 2025, funding for MITRE to develop, operate, and modernize the Common Vulnerabilities and Exposures (CVE®) Program and related programs, such as the Common Weakness Enumeration (CWE™) Program, will expire. The government continues to make considerable efforts to support MITRE’s role in the program and MITRE remains committed to CVE as a global resource.” 4,895 503 Comments https://www.linkedin.com/posts/bkrebs_mitre-has-announced-that-its-funding-for-activity-7318006192021143554-cu5S?trk=public_profile_relatedPosts
Gareth Heyes I’m a security researcher… • 16K followers https://uk.linkedin.com/in/gareth-heyes-25a62b2?trk=public_profile_relatedPosts_face-pile-cta
We've just released Shadow Repeater, for AI-enhanced manual testing. Simply use Burp Repeater as you normally would, and behind the scenes Shadow Repeater will learn from your attacks, try payload permutations, and report any discoveries via Organizer.  1,397 34 Comments https://www.linkedin.com/posts/gareth-heyes-25a62b2_weve-just-released-shadow-repeater-for-activity-7298331196135002112-AwNn?trk=public_profile_relatedPosts
Richard Staynings Cylera • 26K followers https://www.linkedin.com/in/richardstaynings?trk=public_profile_relatedPosts_face-pile-cta
After DHS did not renew its funding contract for reasons unspecified, MITRE’s 25-year-old Common Vulnerabilities and Exposures (CVE) program was slated for an abrupt shutdown on April 16, which would have left security flaw tracking in limbo. CISA stepped in to provide a bridge. A CISA spokesperson sent CSO a statement saying, “The CVE Program is invaluable to cyber community and a priority of CISA. Last night, CISA executed the option period on the contract to ensure there will be no lapse in critical CVE services. We appreciate our partners’ and stakeholders’ patience.” Sources say the contract extension will last 11 months. Yosry Barsoum, vice president and director of the Center for Securing the Homeland at MITRE, commented: “Thanks to actions taken by the government, a break in service for the Common Vulnerabilities and Exposures (CVE®) Program and the Common Weakness Enumeration (CWE™) Program has been avoided. As of Wednesday morning, April 16, 2025, CISA identified incremental funding to keep the Programs operational. We appreciate the overwhelming support for these programs that have been expressed by the global cyber community, industry, and government over the last 24 hours. The government continues to make considerable efforts to support MITRE’s role in the program and MITRE remains committed to CVE and CWE as global resources.” https://lnkd.in/gPhB8vVQ 170 12 Comments https://www.linkedin.com/posts/richardstaynings_after-dhs-did-not-renew-its-funding-contract-activity-7318653782618189824-Xjf2?trk=public_profile_relatedPosts
Semperis 38K followers https://www.linkedin.com/company/semperis?trk=public_profile_relatedPosts_face-pile-cta
NTDS.DIT extraction provides a stealthy way for bad actors to access AD. How can you cut them off before they do damage? Senior Identity and Security Architect Huy Kha explains that detecting NTDS.DIT extraction requires attention to command-line activities and domain controller Application logs. Learn how maintaining this level of vigilance is made easier by using automation in tools such as endpoint detection and response (EDR) solutions. 🔗 https://lnkd.in/grnZuztm 30 https://www.linkedin.com/posts/semperis_ntdsdit-extraction-provides-a-stealthy-way-activity-7339026716842987520-pcWc?trk=public_profile_relatedPosts
Jeff Baldwin, DSc 11K followers https://www.linkedin.com/in/drjeffbaldwin?trk=public_profile_relatedPosts_face-pile-cta
DFARS 7012 requires contractors to implement NIST SP 800-171 to protect Covered Defense Information (CDI). DFARS 7019/7020 requires contractors to perform a basic assurance self-assessment and submit a score to SPRS that is within 3 years of contract award. DFARS 7021 specifies the CMMC level required to be awarded a DoD contract. CMMC levels require either self-assessment or third-party assessment. When making the determination of the level required for a contract, there is a memo that outlines the process that must be followed by the DoD program manager to obtain a waiver to "CMMC assessment requirements" for that contract. "Program Managers and requiring activities should identify information security requirements for the types of information most likely to be associated with the planned contract effort. When market research indicates that including a CMMC assessment requirement may impede ability to generate robust competition or delay delivery of mission critical capabilities, the SAE, CAE, or DAE may approve requests to waive inclusion of CMMC assessment requirements. SAEs and CAEs must carefully weigh the risk of potential loss of CUI associated with mission critical capabilities before granting a waiver." Level 1 - "There are no circumstances likely to warrant approval of requests to waive CMMC Level 1 requirements." Level 2 - "In rare circumstances. such as when seeking competition from non-traditional DoD sources. waivers may be warranted for CMMC Level 2 third-party assessment requirements. Such waivers are not appropriate for contracts requiring performance by a cleared defense contractor. Approved waivers on a class basis must include a planned expiration date and guidance for requiring CMMC certification in subsequent solicitations." Level 3 - "In rare circumstances, waivers may be warranted for CMMC Level 3 third-party assessment requirements: such waivers, however, are not appropriate for contracts or work statements requiring access to both unclassified and classified DoD information." Full memo on the process found here, starting on page 6: https://lnkd.in/eeBCW53n #cmmc #dib #dfars 58 12 Comments https://www.linkedin.com/posts/drjeffbaldwin_cmmc-dib-dfars-activity-7404231656766853120-nJml?trk=public_profile_relatedPosts
Cyber Edition 189K followers https://in.linkedin.com/company/cyberedition?trk=public_profile_relatedPosts_face-pile-cta
🔎 Website OSINT: Seeing your attack surface the way an adversary would 🌐 From certificate transparency logs (crt[.]sh, SSL Labs) to Shodan/Censys passive scans, every website leaks pieces of intelligence. 💡 With the right approach, analysts can: >Map hidden subdomains & infrastructure >Detect outdated frameworks & technologies >Trace WHOIS / ASN records for forgotten assets >Audit security headers to spot weak policies >Identify lookalike domains used in phishing ⚡ Website OSINT isn’t about exploitation, it’s about awareness, monitoring, and defense. The data is already public; the skill lies in connecting the dots before attackers do. 🛑 Link in comment! 58 3 Comments https://www.linkedin.com/posts/cyberedition_website-osint-seeing-your-attack-surface-activity-7371258801343131648-R4x5?trk=public_profile_relatedPosts
Dr. Rob Campbell, FBBA IBM Quantum Safe Cryptography… • 28K followers https://www.linkedin.com/in/dr-rob-campbell-fbba-11816487?trk=public_profile_relatedPosts_face-pile-cta
Full Preprint Now Available: "The Next-Generation Security Triad: Unifying PQC, ZTA, and AI Security through a Shared Modernization Substrate." Problem: Three migrations compete instead of aligning. 1️⃣ PQC Migration Driven by NIST, NSA, CNSA 2.0 timelines Requires hardware, firmware, and key lifecycle changes Skills: Classical and PQC cryptography, protocol engineering, key management (KMS/HSM) modernization, software, hardware & firmware engineering, testing, evaluation, & validation 2️⃣ Zero Trust Architecture (ZTA) Driven by DoD ZT Strategy and DoDI 8500-series modernization Focus: identity, network segmentation, & continuous authentication Skills: IAM, ICAM, microsegmentation, policy enforcement points 3️⃣ AI/ML Security Driven by DAF AI Strategy, DoD Responsible AI, NIST AI RMF Focus: model integrity, supply chains, data governance, and secure ML Ops Skills: data engineering, secure ML pipelines, model assurance Result today: Different PMOs Different budgets Different SMEs Different directives and timelines Massive duplication of effort 🟩 Solution: Build a Joint Modernization Layer (JML) This is the single structure that lets you align all three modernization efforts without forcing their timelines to match. The Joint Modernization Layer provides: 1. Crypto-Agile Infrastructure (for PQC + AI + ZTA) PQC-ready KMS/HSM Hybrid classical+PQC TLS Crypto-agile libraries required by both ZTA enforcement points and AI pipelines Standardized key lifecycles 2. Unified Identity Layer (for ZTA + AI + PQC) ICAM modernization (IdAM for humans + machine identities for AI services) Attribute-based access control (ABAC) is used by ZTA and AI model authorization PKI upgrade planning for PQC-capable certificates 3. Unified Data Protection & Classification (for all three) Data categorization determines PQC priority, ZTA segmentation, and AI dataset governance Standard tagging enables automated policies enforced by ZTA and AI pipelines Defines which datasets require PQ-protected storage for long retention 4. Telemetry + Continuous Monitoring Fabric ZTA needs it for trust scoring AI needs it for model integrity and anomaly detection PQC needs it for crypto downgrade and misconfiguration detection 5. Upgraded CI/CD and Software Supply Chain AI models become “software artifacts.” PQC changes require new code signing + pipeline updates ZTA mandates attestation of workloads All three share the same DevSecOps modernization 🟨 What this accomplishes ✔ You don’t need AI gurus in the ZTA team ✔ You don’t need PQ crypto SMEs in your AI red team ✔ You don’t need ZTA microsegmentation experts in your PQC working group Instead, you define shared platform capabilities and let the domain-specific teams deliver their pieces on top. PQC secures the cryptographic foundation → ZTA secures the architecture → AI secures and enhances the intelligence of the system. Full analysis → Link: https://lnkd.in/exfhZzSk #PQC, #ZTA, #AISecurity 23 https://www.linkedin.com/posts/dr-rob-campbell-fbba-11816487_pqc-zta-aisecurity-activity-7404191596973555712-Tp8s?trk=public_profile_relatedPosts
Jack Cable Corridor • 11K followers https://www.linkedin.com/in/jackcable?trk=public_profile_relatedPosts_face-pile-cta
Helpful read: CISA and FBI's Secure by Design Alert on buffer overflows Memory safety vulnerabilities like buffer overflows are responsible for up to 2/3 of all vulnerabilities in memory unsafe code, and a significant portion of vulnerabilities exploited in the wild. Check out the guidance for the business case on why companies should adopt memory-safe languages, in line with secure by design principles. https://lnkd.in/gVSu67Hq 57 1 Comment https://www.linkedin.com/posts/jackcable_secure-by-design-alert-eliminating-buffer-activity-7331427104443572226--Koi?trk=public_profile_relatedPosts
Caitlin Condon VulnCheck • 4K followers https://www.linkedin.com/in/ccondon?trk=public_profile_relatedPosts_face-pile-cta
New exploits, detections, PCAPs, and queries now available to VulnCheck initial access intelligence customers. This week's haul includes an original #exploit for N-able N-Central CVE-2025-8875, a post-auth RCE vuln that was exploited as 0day a few weeks back and still has virtually no details available. Also included are exploits for LibreNMS, BentoML, and Shenzhen Aitemi 300 devices. As always, the point of initial access intelligence isn't just the 'sploits, though they're certainly cool — it's to give a 360-degree view of exposure, exploitation, detection, and adversary value. I loved these release notes long before I joined the company. Now I get to ship 'em. https://lnkd.in/eXmBx9td 34 https://www.linkedin.com/posts/ccondon_new-exploits-and-detections-for-n-able-n-central-activity-7369846342812323840-J_rd?trk=public_profile_relatedPosts
View top content https://www.linkedin.com/top-content/
Gustavo Picon São Paulo, Brazil https://br.linkedin.com/in/gustavo-picon-7254551b7?trk=public_profile_samename-profile
Gustavo Picon Bucaramanga https://co.linkedin.com/in/gustavo-picon-359a2525a?trk=public_profile_samename-profile
Gustavo Picón Araure https://ve.linkedin.com/in/gustavo-pic%C3%B3n-109805267?trk=public_profile_samename-profile
Gustavo Picon Medellín https://co.linkedin.com/in/gustavo-picon-249333259?trk=public_profile_samename-profile
See others named Gustavo Picón https://www.linkedin.com/pub/dir/Gustavo/Pic%C3%B3n?trk=public_profile_samename-see-all
32m The AI-Driven Cybersecurity Analyst https://www.linkedin.com/learning/the-ai-driven-cybersecurity-analyst?trk=public_profile_recommended-course
15m A Standalone Project: Build a Network Packet Sniffer to Detect Vulnerabilities or Attacks https://www.linkedin.com/learning/a-standalone-project-build-a-network-packet-sniffer-to-detect-vulnerabilities-or-attacks?trk=public_profile_recommended-course
2h 9m Wireshark: Malware and Forensics https://www.linkedin.com/learning/wireshark-malware-and-forensics?trk=public_profile_recommended-course
See all courses https://www.linkedin.com/learning/?trk=seo_pp_d_cymbii_more_m015_learning
About https://about.linkedin.com?trk=public_profile_v3_desktop_footer-about
Accessibility https://www.linkedin.com/accessibility?trk=public_profile_v3_desktop_footer-accessibility
User Agreement https://www.linkedin.com/legal/user-agreement?trk=public_profile_v3_desktop_footer-user-agreement
Privacy Policy https://www.linkedin.com/legal/privacy-policy?trk=public_profile_v3_desktop_footer-privacy-policy
Your California Privacy Choices https://www.linkedin.com/legal/california-privacy-disclosure?trk=public_profile_v3_desktop_footer-california-privacy-rights-act
Cookie Policy https://www.linkedin.com/legal/cookie-policy?trk=public_profile_v3_desktop_footer-cookie-policy
Copyright Policy https://www.linkedin.com/legal/copyright-policy?trk=public_profile_v3_desktop_footer-copyright-policy
Brand Policy https://brand.linkedin.com/policies?trk=public_profile_v3_desktop_footer-brand-policy
Guest Controls https://www.linkedin.com/psettings/guest-controls?trk=public_profile_v3_desktop_footer-guest-controls
Community Guidelines https://www.linkedin.com/legal/professional-community-policies?trk=public_profile_v3_desktop_footer-community-guide
User Agreementhttps://www.linkedin.com/legal/user-agreement?trk=linkedin-tc_auth-button_user-agreement
Privacy Policyhttps://www.linkedin.com/legal/privacy-policy?trk=linkedin-tc_auth-button_privacy-policy
Cookie Policyhttps://www.linkedin.com/legal/cookie-policy?trk=linkedin-tc_auth-button_cookie-policy
Forgot password?https://www.linkedin.com/uas/request-password-reset?trk=csm-v2_forgot_password
Join nowhttps://www.linkedin.com/signup/public-profile-join?vieweeVanityName=gpicon&trk=public_profile_contextual-sign-in-modal_join-link
User Agreementhttps://www.linkedin.com/legal/user-agreement?trk=linkedin-tc_auth-button_user-agreement
Privacy Policyhttps://www.linkedin.com/legal/privacy-policy?trk=linkedin-tc_auth-button_privacy-policy
Cookie Policyhttps://www.linkedin.com/legal/cookie-policy?trk=linkedin-tc_auth-button_cookie-policy
Open the app ms-windows-store://pdp/?ProductId=9WZDNCRFJ4Q7&mode=mini&cid=guest_desktop_upsell

Viewport: width=device-width, initial-scale=1.0

Robots: max-image-preview:large, noarchive


URLs of crawlers that visited me.