Toggle navigation
TWunroll
TWunroll
faq
Contact US
#NIST
IBMPolicy
IBMpolicy
IBM welcomes the #NDAA’s overwhelming and bipartisan passage. It includes many important priorities, including provisions to boost our nation's #cybersecurity, advance open #5G networks, maintain global leadership in #AI &
Read more
Gerald Barnett
umbut
Yes, Bayh-Dole does authorize government intervention to control price. 35 USC 203(a)(1) authorizes federal agencies to march-in if a contractor has not timely achieved or is not likely to achieve
Read more
Revolving Door Project
revolvingdoorDC
THREAD: Why should progressives care about the Commerce Dept? It's often gone to a wealthy businessperson...which means we don’t really know what a populist Commerce Dept would look like. The
Read more
Guided matter waves lab
quantumsensing
With visitors in the #lab, we often get the question: "How do the atoms initially get into the vacuum system?"Let's look at it in this thread and discuss how one
Read more
Pipes2494⭐⭐⭐🇺🇸
Pipes2494
1) Thread: POTUS Prepping us for Barr and morePOTUS tweet at 12:03 AM Dec 1Date\Timestamp match to dropDrop 2538 Dec 3 12:52:14Post Midterms, 4 Investigations"DOJ [policy] does not discuss ongoing
Read more
Katiascylife
katiascylife
Hello New Followers! Allow me to introduce myself. I'm Katia. System Engineer| Cybersecurity Techincal Resume Writer| Author| Mentor| Your Comic Relief | Inspiration through a rough storm| Cybersecurity Career Developer
Read more
Cyber Statecraft
CyberStatecraft
Since 2010, there have been at least 31 distinct attacks targeting updates in the software supply chain, of which 17 compromised build servers or altered code. Of those, more than
Read more
Katherine Ellen Foley
katherineefoley
Worried about your #neckgaiter and/or #buff you've been using as a mask cos of some headlines you've seen? I gotchu. Tl;dr that study did NOT say that all neck gaiters
Read more
Katiascylife
katiascylife
" I'm interested in Cybersecurity where do I start?" 1. Understand that Cybersecurity needs everyone from various educational backgrounds 2. Cyber HAS technical and non technical roles 3. YOU HAVE
Read more
JohnMB | CyberInsight on YouTube
JBizzle703
I wanted to put together and share a bunch of my infographics. These cover a wide range of IT topics from subnetting, IPV6, binary, troubleshooting methodologies, DNS, OSI models, and
Read more
Kevin Rusnak
aerohistorian
12/14/1896: James Harold "Jimmy" Doolittle was born in CA. Famous for the eponymous #WWII Raid on Tokyo, he was first a pioneer in @usairforce research & dev and was the
Read more
Ian56
Ian56789
#NeverForgetWill Trump play the video of his TV interview on the morning of 9/11?Trump KNOWS the buildings couldn't have been brought down by jet fuel.It must have been done by
Read more
Furman
furmanism
Security Analyst interview questions.1. What type of Security you use in your Home Network?2. What you know about global information Security policy or Information Security policy in the organisation /
Read more
Dr Emma Woolliams 🛰 🌍💡 ⚖️
EmmaWoolliams
Hi Eli! I think there are lots of great resources on national Metrology Institute (NMI) websites (eg @NPL,?@NIST) and YouTube channels and of course @BipmMedia. But I’ll have a go
Read more
Cyber Statecraft
CyberStatecraft
THREAD | A groundbreaking espionage operation targeting USG, the #Sunburst incident was also software supply chain compromise similar to 31 attacks observed since 2010. Using our Breaking Trust report @Cyberstatecraft
Read more
Maritez Apigo
MaritezApigo
Since Proctorio is a key sponsor of the Online Teaching Conference this year, my colleague and friend @AlohaSargent and I are boycotting it. Below are the equity concerns of minoritized
Read more
‹
1
2
3
4
›
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree