Mikey Pruitt
banner
roadtociso.bsky.social
Mikey Pruitt
@roadtociso.bsky.social
Cybersecurity Pro & Threat Hunter Wannabe
Legacy isn't your title or salary. It's the work you keep doing when no one applauds. My contribution: pushing protective DNS as a baseline, not an optional extra. Blocks phishing, malware, C2, and deploys in minutes. Are you building things people can still use when you're gone?
September 10, 2025 at 10:00 AM
Should you hire a GTM Engineer? No. Become one. Part ops, part marketer, a touch of sales, they turn boring work into automation. Start small: connect your inbox to n8n, ask for summaries, then add a node called DELETE GARBAGE EMAILS. What boring task will you automate?
September 9, 2025 at 10:00 AM
Cloud-first is dead. Companies are buying racks again. GPUs wreck cloud bills, API calls keep climbing, and local AI tools actually work now. If you're still all-in cloud, what's your last month's GPU bill look like? Anyone quietly building a server room?
September 4, 2025 at 1:59 PM
Cloud-first is dead. Companies are buying racks again. GPUs wreck cloud bills, API calls keep climbing, and local AI tools actually work now. If you're still all-in cloud, what's your last month's GPU bill look like? Anyone quietly building a server room?
September 4, 2025 at 12:56 PM
Our org chart just got new hires: Penny (people bot), Parker (marketing AI), and Diesel (product design AI). They don’t just sit in boxes they actually do the work.

What should we build next? A burnout predictor? Task juggler? Or an AI that writes tweets better than me? Your move.
July 23, 2025 at 10:00 AM
Malware-as-a-Service = the dark web’s SaaS.
Rent malware kits with dashboards, updates & support. Even refunds if caught.
For a few hundred bucks, anyone with a grudge can launch pro-level attacks no coding needed.
44% spike in attacks last year. 57% of company hacks via MaaS.
July 8, 2025 at 12:15 PM
Qantas hit by a cyberattack not on their network, but a vendor’s contact-center platform. 6 million customer records exposed.

Outsourcing = extended attack surface. Your vendor’s weak link = your risk.

Silent breaches like this are a wake-up call.
July 3, 2025 at 8:29 PM