Toggle navigation
TWunroll
TWunroll
faq
Contact US
#Infosec
Alex Stamos
alexstamos
Initial thoughts on the ill wind blowing through infosec teams across the country: 1. The overall security quality of enterprise IT products is terrible and that is the responsibility of
Read more
Kelly Shortridge
swagitda_
The attackers stole an investors relations infographic (not, say, a draft 10-K filing), which is pretty cute conceptually.But investor relations data is not necessarily straightforward to monetize (a thread):https://twitter.com/financialtim
Read more
Falcon Darkstar
FalconDarkstar
My friend interviewed a job applicant the other day who had 5 years of experience in “cyber”, a master’s degree, and plenty of certifications, only to find the only thing
Read more
Brian Anderson
btanderson72
We need to have a serious talk about the difference between being ‘offended’ and being ‘harmed’. a conversation about forests and trees: 1/x The reason I use the analogy of
Read more
lcamtuf
lcamtuf
Thread: the subject of online harassment is pretty interesting to me - because I know I used to be a problem to others back in the day.It started in the
Read more
Kim Zetter
KimZetter
Per briefing today on SolarWinds hack, @RonWyden says IRS was not compromised or taxpayer data affected. However, hack of Treasury Department "appears to be significant." Treasury breach began in July,
Read more
Jordan Schachtel
JordanSchachtel
When we talk about hacking & attribution, it's important to understand that tier 1 cyber nations (USA, China, Russia, & select Euros) can make it appear as if another country
Read more
jacobian
jacobian
So much this. A physical breach is a nightmare scenario for infosec. On the off-chance that any of my followers are involved in this -- I do have some experience
Read more
Cyber Statecraft
CyberStatecraft
Since 2010, there have been at least 31 distinct attacks targeting updates in the software supply chain, of which 17 compromised build servers or altered code. Of those, more than
Read more
R
ReturnedRedux
An often overlooked and now purposely obfuscated event that largely informed the policy of Japanese internment at the start of WW2 was the Niʻihau incident. It’s not taught in any
Read more
Jason Lang
curi0usJack
One infosec professional's perspective on OST. Beware, this thread contains nuance... 1 Having watched the OST debate from the sidelines, I have enjoyed the thinking challenge that the debate represents,
Read more
Ido Kilovaty
idokilovaty
I teach cybersecurity law & policy to law, graduate, and undergraduate students. Here are some of my observations as I'm wrapping up the Fall 2020 semester. 1. Law students keep
Read more
Matthew Sheffield
mattsheffield
This Parler user explains it quite well here. Because of yet more security flaws at Parler, it's now possible for all that "free speech" to be shared and archived with
Read more
Min Chao Choy
minchaochoy
THREAD: Seeing a trend in the drama abt Zhang Guo James Willy et al: "You can't find him, he's in Pyongyang" "DPRK spies" etc, just a general lack of info
Read more
Chris Sanders 🍯
chrissanders88
Let's talk about the differences between novices and experts. But, instead of cyber security, we'll use airport baggage screeners as an example. These are the folks who use the scanner
Read more
Rachel Tobac
RachelTobac
Pentesters must take ethics/cultural events into account when planning phishing pentests. I don’t use any fear pretext or ones that compromise a person’s ability to plan (financially for example) or
Read more
‹
1
2
3
4
5
6
7
8
9
10
›
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree