@jerry
Last month, I had a series of interactions with someone I mentored decades ago who grew up to become a CISSP and technical manager.
I proposed that we assess Doge as an insider threat and compare notes on how to do threat modeling and detection.
He felt that anything doge did was ok with him and didn't think verification of ANYTHING was necessary, because "it will do more to reduce spending than the previous administration"
🧵