J.  

@CxOSidekick

Data + Analytics + Strategy + User Need. Not in that order. For cybersecurity​ stuff. 'You've been making the wrong mistakes' - Thelonious Monk

Vrijeme pridruživanja: siječanj 2012.

Tweetovi

Blokirali ste korisnika/cu @CxOSidekick

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @CxOSidekick

  1. Prikvačeni tweet
    6. kol 2019.
    Poništi
  2. prije 3 sata

    Much more efficient to make it a workflow status :)

    Poništi
  3. proslijedio/la je Tweet
    prije 14 sati

    Today just did the final sell on me for Google Colab > Jupyter: Jupyter crashed asked if I wanted to switch to a checkpoint for 2min ago. By "2min", it meant 5 hours, and a github issue WONTFIX declares "you should use git." Colab tracks every edit, just like gdocs.

    Poništi
  4. prije 4 sata

    And so I shall show anger Block your domain at my email gateway Because these are the laws Of my information super highway.

    Poništi
  5. proslijedio/la je Tweet
    4. velj

    Supporting and protecting psychological safety can be easy when things are going ok. It’s supporting and protecting it in the midst of mounting social and political pressures that matters.

    Poništi
  6. proslijedio/la je Tweet
    4. velj

    I have no words to explain how amazing this job description is (for an SRE role that we have) Please share with your network and apply if you want to join our journey, make a difference and learn a LOT (all credit goes to from my team)

    Poništi
  7. 4. velj

    Ha "With all of those phones connected to Google Maps for driving directions, it is trivially easy to fool the multibillion-dollar adtech company's systems into believing that there is a severe traffic jam in the area. Even when there is no traffic jam in reality."

    Poništi
  8. proslijedio/la je Tweet
    3. velj

    We open sourced riskquant last week. It's a library for quantifying risk and helps teams dig deeper into areas like loss scenarios and risk tolerance.

    Poništi
  9. 3. velj

    Been working on a high level view of AWS logging, with some IAM-specific stuff re process flows. I wanted a quick guide with [a] all the relevant links (pink boxes); [b] notes re 'gotchas'; [c] call outs re inconsistencies across documentation. Anyone else done sbthg similar?

    Poništi
  10. 3. velj
    Poništi
  11. 2. velj

    Sound advice for dodging silver bullets. Follow these steps and you'll probably find >95% of vendors don't get past the drawbridge. But, those who do will be the partners you're looking for, who care about driving the market upwards from what is mostly the bottom of a barrel.

    Poništi
  12. 30. sij

    As a family godmother would say: Ya done know. And believe it. If you know you've laid a foundation for future teams to fight a better battle on, you've played - and won - in the arena.

    Poništi
  13. proslijedio/la je Tweet
    29. sij

    Both and are excellent speakers, and this is bound to be a fantastic talk.

    Poništi
  14. 29. sij

    Or, as someone once said to me when I came in wearing a suit to go to a vendor dinner in somewhere that had a dress code "Hope the verdict is not guilty, but that tie won't do you any favours".

    Poništi
  15. 29. sij
    Poništi
  16. 28. sij

    OH at local coffee shop: "It's like that horse scene in Braveheart mate, but instead I'm shouting 'You can take my integrity, but you'll never take my salary!'"

    Poništi
  17. 27. sij

    Only if we can dip them in our tea, (and sigh with sadness as they disintegrate into our cup before consumption).

    Poništi
  18. 27. sij

    #3 is an outstanding read. There are some fundamental principles laid out that can apply also to smaller projects (specifically what skill sets we apply across life-cycle stages, and their relative contribution).

    Poništi
  19. 27. sij
    Poništi
  20. proslijedio/la je Tweet

    IoC Scanner shows if Citrix appliances have been compromised via CVE-2019-19781 - Help Net Security

    Poništi
  21. 23. sij

    To: vendismals Re: thy sales spiel There is that which is different (anomaly 🤣) There is that which is 'similar to action threat actor would take' (benign 😭) There is a trend of alerts on a single host (🧐sigh). There are detections across multiple hosts that tell a story 🎯.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·