Ed Targett

@CBREditor

Editor . Work: cloud, infosec, emerging tech; more. Play: biodiversity, bikes, boxing. Not a soupçon of mischief nor disclaimer in sight. DMs open.

Vrijeme pridruživanja: ožujak 2018.

Tweetovi

Blokirali ste korisnika/cu @CBREditor

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @CBREditor

  1. prije 52 minute

    Picturing a short, sharp spike in demand for EPYC Rome CPUs...

    Poništi
  2. prije 4 sata

    ACRONYM, a US non-profit appears to confirm its subsidiary "Shadow Inc." built the app at the heart of today's caucus chaos, as security researchers scramble to test caucus apps. (ACRONYM's own tool testing page is insecure...)

    Poništi
  3. prije 5 sati

    So has anyone got their hands on a build of this app yet? (Was it opened to testing by anyone reputable?)

    Poništi
  4. proslijedio/la je Tweet

    To the person who figured out my honeypot is a honeypot could you please stop putting the picture of Pooh bear with a jar of honey on it? Its like this person's life mission, I've blocked him on: - Client - IPs (now on Tor ffs) - The image (he just edits 1 pixel every time...)

    Prikaži ovu nit
    Poništi
  5. prije 6 sati

    Interesting to see enhanced disclosure from Alphabet. One takeaway: Youtube making double what GCP does...

    Poništi
  6. prije 23 sata

    Microsoft Teams took a tumble today because someone let a cert somewhere expire... Whoops.

    Poništi
  7. proslijedio/la je Tweet
    3. velj

    this is what the internet used to be like

    Poništi
  8. 3. velj

    "Darling come out onto the balcony, the drone's here to take your temperature and give you your medicine"

    Poništi
  9. 3. velj

    Police: cyber crime gangs are increasingly planting "sleepers" in cleaning agencies to access physical IT infrastructure. "Even the old 'dropping a USB' is back"...

    Poništi
  10. proslijedio/la je Tweet
    31. sij

    Good news — since China stole the IP of F-35 for their J-31 it means their software is crap too. NSA can just patch diff between the current builds and the stolen builds and they’ll have hundreds of 1day exploits! China’s industrial espionage is a vulnerability!! 😋

    Tweet je nedostupan.
    Poništi
  11. 31. sij

    What's the actual mortality rate for vs your average annual outbreak? About 2% vs 1%? Genuine question, like to see most recent data...

    Poništi
  12. 30. sij

    Looking to talk to physical penetration testers/companies who provide such services asap. Get in touch if that's you, or a client.

    Poništi
  13. 30. sij

    Few things are more turgid than a keynote from a politician at a conference of any stripe, and Minister for Digital and Broadband Matt Warman is doing little to dispel that particular stereotype at SINET today...

    Poništi
  14. 30. sij

    Also an issue for CNI providers: which damn agency to talk to in the US? Homeland Security? NSA? The FBI? DOE? Even BP's CISO seems confused, although he says trust is high and collaboration strong in UK & US.

    Poništi
  15. 30. sij

    Strong panels at today. In discussion. BP's CISO Simon Hodgkinson: "Bad guys move at wire-speed. We still meet once a quarter. Not sufficient. [adds] Trust relationships with gov't excellent... in US can be difficult to understand who we should be collaborating with"

    Poništi
  16. 30. sij

    Avast's CEO apologises for sale of user data, promises to end "Jumpshot" programme "with immediate effect" Stable door, horse bolted?

    Poništi
  17. 30. sij

    New tax changes effective in 7 weeks are causing project delays, hurting IT contractors and turning into an "absolute shit show" according to one CEO. Have you been impacted by ? We'd like to hear from you. Drop me a DM.

    Poništi
  18. 29. sij

    Google continues to prod holes in Apple's security... via Even Corellium, currently getting sued by Cupertino, was kind enough to fling them a cheeky bug report...

    Poništi
  19. proslijedio/la je Tweet
    29. sij

    New security vulnerability needs urgent patching. RCE takes inspiration from 1988's Morris worm, has been exploitable since 2018. Found by

    Poništi
  20. 29. sij

    Illustration ideas for "Big Data" stories needed because if I come within a 10 miles of another Matrix picture I'll chew up this laptop. Hit me with your data pictures...

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·