, 9 tweets, 2 min read
My Authors
Read all threads
Thread on cognitive biases in cybersecurity I've noticed:

Maginot Line: you got breached by an impersonation attack, so you go buy an anti-impersonation solution and assume you're much safer. Sort of like checking people's shoes at the airport.
Survivorship/reporting bias: You treat statistics on breaches that have been reported publicly as representative of the threat landscape, when the most successful breaches go undetected.
Just-world bias / moral luck bias: you believe org X's security failings are uniquely terrible because they got publicly breached, even while other orgs with similar postures (including yours) haven't been breached, simply due to luck.
Cheap signaling susceptibility: a security vendor has a great marketing/sales department but a terrible product. Due to lack of good benchmarks and measures of quality, you're biased towards buying their product purely on the basis of these signals.
Bandwagon effect: Everyone's buying X (partly due to survivorship bias in threat landscape reporting, Maginot Line bias, and cheap signaling susceptibility), so you're biased towards buying X.
Neglect of probability / neglect of realistic threat models: A threat researcher does a PoC of a virtuosic attack against thermostats at a conference. You have your team dedicate outsized energy to investigating IoT security at the cost of patching your desktops.
Base rate fallacy: You think because your memory scanning Yara rule got 1 false positive on your false positive test set of 500, you can go use your Yara rule to hunt for threats on your enterprise network, where it'll produce millions of false positives.
Simpson's paradox: a threat vector X is observed to fail more often in the field than threat vector Y, therefore it's less dangerous. When actually threat vector X tends to get used against harder targets, and is much more efficacious than Y when controlling for target hardness.
"Anecdote/grapevine bias": Lots of your friends in DFIR, security product development, and at conferences have been saying that mobile is the next major attack surface. You have no data (survey, telemetry, FBI, ...) showing this, but treat it as an operational fact.
Missing some Tweet in this thread? You can try to force a refresh.

Enjoying this thread?

Keep Current with Joshua Saxe

Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!