Toggle navigation
TWunroll
TWunroll
faq
Contact US
#CyberSecurity
SCPatriot
SCPatriotSC
Elliot Kerwin (Maricopa County) had laptops and USB drives seized from his home on 11.5. Investigation into potential voter record hacking ongoing. He has held Senior IT positions previously in
Read more
Kevin Beaumont
GossiTheDog
Mr Robot and the romanticised view of hacking in popular culture has a lot to answer for. The reality of cybersecurity as a career is it’s pretty boring, underdeveloped, nobody
Read more
Mona Pinchis-Paulsen
loyaladvisor
In US-Certain Measures on Steel and Aluminum Products. -One thing that many of us found interesting was the DS512 panel's elucidation as to how a Member can articulate 'war or
Read more
Lesley Carhart
hacks4pancakes
It is really important, in infosec and natsec, to understand if your adversary is making a tactical or a strategic choice. For instance, why are they moving laterally? Is it
Read more
Bill Robinson
NewmanRobinson
NSIRA's long-awaited first report is finally out, and overall the new review agency seems to be off to a pretty good start. But I do have some serious concerns related
Read more
Jones Baraza
JonesBaraza
My first interaction with a computer came when I had just completed my KCPE. My dad wanted some documents printed & thus sent me to a local cyber cafe. And
Read more
BLOG-ORATOR
OratorBlog
BREAKING. ALERT20,000 NATIONAL GUARD FORCE DEPLOYED IN ELECTION FRAUD STING OPERATIONMarked Ballots with blockchain markers used to track Election Transgressions by Team Trump Sting Operationhttps://twitter.com/Wyn1745/status/13245668179358
Read more
HYVE
HYVEE7
She just ruined #DominionVotingSystems Way to go!Melissa Carone was brought on as a Contractor - IT and Cybersecurity.She even called the FBI!Listen to what she says.(Thread) 2 3 4 Full
Read more
Lesley Carhart
hacks4pancakes
A really good interview question to scope out how mature an infosec person’s understanding of corporate security programs is this:“How to you measure the success of a phishing test security
Read more
Lindsay P. Gorman
LindsayPGorman
This is *exactly* why a) vulnerabilities at the infrastructure layer are so difficult to guard against; b) why cyber risk assessments need to be taking this layer into account, even
Read more
Halie Soifer
HalieSoifer
For 59 yrs, Congress passed a defense authorization bill that's become law. The NDAA authorizes military spending, including salaries & benefits for service members & families. This year's NDAA includes
Read more
Jennifer Cohn ✍🏻 📢
jennycohn1
First, vendors exposed county central tabulators—which aggregate precinct totals—to internet hacking on election night by installing remote access software. Now, they expose them to internet hacking on election night by
Read more
ORF
orfonline
In September, MLI and ORF organised their first Canada India Strategic Forum, a joint initiative supported by the Canadian and Indian governments: https://bit.ly/38yTaMX The discussion, held under the Chatham House
Read more
Erin D. Dumbacher
erin_dian
Digital security and reliability have to be priorities for our nuclear weapons complex /1https://www.nti.org/newsroom/news/digitization-and-automation-us-nuclear-arsenal-carries-significant-risks-along-benefits-says-new-nti-study/ https://t
Read more
W🌎rld
ticfWRLD
Election FraudTHREAD 1/: Lets begin with basics. Trump is winning in MI, WI, PA, GA, NC on election night, then all stop counting. Most of these states were the first
Read more
jason
restorefreedom4
1. Was Trump 2020 Election a Setup to bring them down? Rumors are floating around about the Watermark, Plausible? Sure. Here is what I know.Do You know Chris Krebs, Head
Read more
‹
1
2
3
4
5
6
7
8
...
25
26
›
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree