Peter Firstbrook

@Pfirstbrook

Research Vice President Gartner responsible for the anti-malware, web gateway and anti-spam markets.

Canada
Vrijeme pridruživanja: svibanj 2009.

Tweetovi

Blokirali ste korisnika/cu @Pfirstbrook

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Pfirstbrook

  1. 30. sij

    Weighted guidance on which vulnerabilities are the most important to patch based on threats, protections, and business risk, is what is missing from most solutions. Breach and Attack simulation will also help prioritize from the attackers viewpoint.

    Poništi
  2. 29. sij

    Eliminating the last 15% of Win 7 endpoints is a higher priority for Security than Operations. Most operations teams consider the project "complete" once they reach about 85-90%. For security it should be 100%.

    Poništi
  3. proslijedio/la je Tweet
    23. sij

    Are you a or & risk leader within your organization? Do you have a great case study to share? If so, we want to hear from you at this year. Submit your story here:

    Poništi
  4. 22. sij

    This. Who believes Bezos was the only victim? Jared, you might want to call the helpdesk.

    Poništi
  5. 21. sij

    Pelosi Statement on McConnell Cover-Up Resolution

    Poništi
  6. 7. sij

    "Password Usage Study Finds 78% of People Were Forced to Reset a Password They Forgot in Past 90 Days," the other 22% forgot that they were forced to reset a password.

    Poništi
  7. 13. pro 2019.

    I don't know who needs to hear this but.. I am not going to RSA, so no I cannot meet there.

    Poništi
  8. 13. pro 2019.

    I think a useful distinction with XDR is local threat intel & IR integration/correlation is out of the box, not DIY in SOAR/SIEM tools. Just like EDR is not just a bunch of Windows logs in one place.

    Poništi
  9. proslijedio/la je Tweet

    "According to nuclear safety expert Bruce G. Blair, the US Air Force's Strategic Air Command worried that in times of need the codes for the Minuteman ICBM force would not be available, so it quietly decided to set the codes to 00000000 in all missile launch control centers."

    Poništi
  10. 5. pro 2019.

    0%. Which is why we advocate an "assume breach" mindset, and recommend putting solutions in place that can detect the breach and enable a rapid response. (note; this topic also applies to credentials.)

    Poništi
  11. 22. stu 2019.

    Total volume of firmware vulnerabilities is still low relative to software, but still, this seems like it is going to bite us eventually. Very few ITOs are prepared to patch firmware. Source:

    Poništi
  12. proslijedio/la je Tweet

    NBC News interviewed me for this 8min animated video that teases a few of the central events and themes of SANDWORM and captures the escalation of Russia's GRU cyberattacks. It serves as a nice little trailer for the book. (Thanks !)

    Poništi
  13. proslijedio/la je Tweet

    It’s a spoiler but I did an upcoming podcast with Microsoft recently about where I think attacks are going. Answer: big game ransomware is going to explode as the barrier to entry lowers.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    You can go to school and spend years trying to learn about great marketing. Or you can spend a few minutes watching Steve Jobs:

    Poništi
  15. 24. lis 2019.

    More evidence of Top Security Trend #5: Security Product Vendors Are Increasingly Offering Premium Services to Help Customers Get More Immediate Value and to Assist in Skills Training.

    Poništi
  16. 21. lis 2019.
    Poništi
  17. 10. lis 2019.

    Nominations still open for Top Security and Risk management trends. What trends do you think are underappreciated and will impact the market over the next 3-5 year or longer?

    Poništi
  18. 1. lis 2019.

    "Help me Obi Wan Kenobi you're my only hope"

    Poništi
  19. 25. ruj 2019.

    This is a great reminder of what has changed since Snowden revelations and why China wants to control 5G. Just consider how much we know about the NSA and how little we know about the unconstrained Chinese surveillance state.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·