Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @AspiringCISO
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @AspiringCISO
-
Prikvačeni tweet
Got recognition at the 5th edition of Information Security Summit and CISO Awards 2019 @ Bangalore.
#ciso#informationsecurity#cybersecurity#infosecpic.twitter.com/TVyPLCyVQK
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Aditya Mukherjee, PhD proslijedio/la je Tweet
Key Finding #5 Here is the breakdown of
#cyberattacks by regions. Note: North#American companies ranked#ransom as the highest motivation for cyberattacks—at70%.@rneelmani@muqbil_ahmar@reach2ratan#ciso#infosec#cybersecurity#security#ransomware#hacking#hackerpic.twitter.com/wdLfgVeptj
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Aditya Mukherjee, PhD proslijedio/la je Tweet
Key Finding #10 Rethink
#CloudSecurity Strategies; Use of a public#cloud, especially multiple public clouds, introduces new attack vectors.#Security tools offered by public cloud vendors are often a popular choice to fill the gap following migration.@rneelmani@reach2ratanpic.twitter.com/jYYSKtsu7W
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Aditya Mukherjee, PhD proslijedio/la je Tweet
Strategies to Secure Multiple Public
#Cloud Environments. 1. Adopting third-party security solutions because the cloud service providers’ core competencies are not#network#security 2. Engaging a fully managed security service 3. Centralizing management of network securitypic.twitter.com/yBTUK9W34H
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Aditya Mukherjee, PhD proslijedio/la je Tweet
According to a
@wef report, the most common threats facing#ISPs and their customers are: 1. Social Engineering Fruad 2. Distribution and deployment of#malware 3. DoS attacks#dynamicCISO#cybersecurity#technology#hacker#infosec#ethicalhacking#GirlsWhoCode#kalilinuxpic.twitter.com/1HCleDHguA
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
An excellent mve and a new dawn in career Road mapping for future CISO's.
#CISO#cio#executiveleadershiphttps://www.forbes.com/sites/peterhigh/2020/02/03/eli-lillys-first-ever-ciso-turned-cio-has-joined-58b-zoetis-as-chief-information-and-digital-officer/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Aditya Mukherjee, PhD proslijedio/la je Tweet
Less than 7 hours after the patch for CVE-2020-0601 was dropped,
@saleemrash1d seems to have reproduced it. Hopefully y'all have patched already...https://twitter.com/matthew_d_green/status/1217246161440051200 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Aditya Mukherjee, PhD proslijedio/la je Tweet
The bust technical summary on that Microsoft-NSA crypto bug (CVE-2020-0601) TL;DR: patch It's bad and PoC code is expected in the coming days https://blog.lessonslearned.org/chain-of-fools/ pic.twitter.com/A8xflE0qrf
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Aditya Mukherjee, PhD proslijedio/la je Tweet
How to check how many ECC (potential CVE-2020-0601) certs you have via powershell: `gci Cert:\ -Recurse | select @{n="Alg";e={$_.SignatureAlgorithm.FriendlyName}},Subject | Where-Object {$_.Alg -ne
$null} | Where-Object {$_.Alg.Contains("ECD")}`
#cve#powershell#ECDSAHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Aditya Mukherjee, PhD proslijedio/la je Tweet
Want Free
? Jump on the Citrix wagon!
Pick a program on https://github.com/arkadiyt/bounty-targets-data/blob/master/data/wildcards.txt …
git clone https://github.com/cisagov/check-cve-2019-19781 …
cd check-cve-2019-19781
pip3 install -r requirements.txt
cat hosts.txt | while read url ; do cve-2019-19781 $url ;done > loot.txt 2>&1 cat loot.txt | grep appearHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Aditya Mukherjee, PhD proslijedio/la je Tweet
CISO - Don't Take it Personally But Make it Personal
#infosec#security#CISO@rneelmani@reach2ratan@hacback17@muqbil_ahmar@AspiringCISO@sameeranja@sameercybertech@Sparyahttps://www.infosecurity-magazine.com/opinions/ciso-personally-make-it …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Aditya Mukherjee, PhD proslijedio/la je Tweet
@Google amends disclosure policy to encourage 'thorough' security patches from developers.#Google will now wait for at least 90 days before disclosing bug details.#infosec#security#ciso#cio@rneelmani@reach2ratan@hacback17@AspiringCISO@sameeranjahttps://www.computing.co.uk/ctg/news/3084901/google-project-zero-disclosure-policy …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Aditya Mukherjee, PhD proslijedio/la je Tweet
Can specific applications of Low-Tech actually be a smarter cybersecurity strategy? Find out more in "Why Taking a Technological Step Backwards May Better Protect America’s Critical Infrastructure" - via
@z3roTrust#Cybersecurity#CriticalInfrastructurehttps://www.lnk.xyz/B1zXIIiT4?aduc=iwpChtA1577542149055 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Check out my latest article: Evaluation of Security Automation & Orchestration Platforms (SOAR) https://www.linkedin.com/pulse/evaluation-security-automation-orchestration-soar … via
@LinkedInHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Check out my latest article: Deception Technology https://www.linkedin.com/pulse/deception-technology-aditya-mukherjee-phd-information-security- … via
@LinkedInHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Check out my latest article: Connected Threat Defense https://www.linkedin.com/pulse/connected-threat-defense-aditya-mukherjee-phd-information-security- … via
@LinkedInHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Aditya Mukherjee, PhD proslijedio/la je Tweet
"Pakistan should vacate
#POK as it's part of Sovereign India" - British MP@BobBlackmanHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Aditya Mukherjee, PhD proslijedio/la je Tweet
If presence of Indian Army scares you then you are living in a wrong country. Picture No-2 is the reason of our Jawan sitting with this SWAG in Kashmir in front of Terrorist/ Pelters.pic.twitter.com/I2fkX9U6nh
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Aditya Mukherjee, PhD proslijedio/la je Tweet
Invite your indulgence in reading my latest book on data privacy.
@IPS_Associationhttps://twitter.com/epauthors/status/1204296667517702144 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.