Tweetovi

Blokirali ste korisnika/cu @sensorfu

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sensorfu

  1. proslijedio/la je Tweet
    30. sij

    Easy deployment has been one of our core design values for our product and I always get a warm feeling when potential customers figure out how easily they can get value out of our product. It made my day! (2/2)

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    30. sij

    I showcased Beacon to prospect abroad and they said: "At first we were worried how we could fit this product into our environment and how much time we need to invest. But it is so straightforward that we only need to decide when we are going to do it". (1/2)

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    13. sij

    We have a solution ( Beacon) to make continuous 24/7 testing to find these routing points from airgapped networks. I think automatic and continuous testing instead of manual audits or tests is the way to go and ensure airgapped networks stay truly isolated.

    Poništi
  4. proslijedio/la je Tweet
    8. sij

    How do you make sure all the segments are properly isolated from each other with only the defined devices (routers, firewalls, remote access, etc.) having the privilege to make decision what is allowed to travel between segments? Our solution:

    Poništi
  5. proslijedio/la je Tweet
    8. sij

    My response to the discussion of "The sin of treating a non-isolated environment as isolated" in /r/privacy:

    Poništi
  6. proslijedio/la je Tweet
    9. pro 2019.

    How did we turn 5G into 5k€ during the 5G hackathon? My hackathon report is up!

    Poništi
  7. proslijedio/la je Tweet
    4. pro 2019.

    The track session 'Cloud delivered: Network & endpoint security' stressed upon simplifying security stack, transforming IT operations and security instrumentation Mr. Vivek Shrivastav

    Poništi
  8. proslijedio/la je Tweet
    4. pro 2019.

    Mr. Sami petajasoja, Vivek shrivastav and Hariharan S in deep dive conversation with Mr.Rajesh Kumar, a session on delivering cloud services for simplifying security stack and transforming security instrumentation.

    Poništi
  9. proslijedio/la je Tweet
    2. pro 2019.

    We had great fun at with some old and new friends! :) Future will show how the implementation of 5G will be done in practice. There is plenty of room for silly mistakes. Like failing the network isolation, where it is needed.

    Poništi
  10. proslijedio/la je Tweet
    2. pro 2019.
    Poništi
  11. proslijedio/la je Tweet
    28. stu 2019.

    We have a vulnerability researcher meeting . We found something fun to do together. 😆

    Poništi
  12. proslijedio/la je Tweet
    21. stu 2019.

    is at . Come and say hi, if you are here!

    Poništi
  13. proslijedio/la je Tweet
    6. stu 2019.

    The second speaker at is from with a talk on escaping from the isolated environments

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    7. lis 2019.

    Sometimes you just can not foresee what kind of leak vectors your "isolated" environment might have. :) "How my application ran away and called home from Redmond".

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    28. ruj 2019.

    Today is remarkable day for scene in Oulu. arranges first ever event. Inspired by . I am happy to be one of the speakers with the topic "Escaping from isolated networks".

    Poništi
  16. proslijedio/la je Tweet
    8. kol 2019.

    New story from : Protecting water utility against nation state cyber adversary

    Poništi
  17. proslijedio/la je Tweet
    17. lip 2019.
    Odgovor korisniku/ci

    Tip of the day. If you have MacOS: open finder, click AirDrop, Allow me to by discovered by: Everyone, Launch "tcpdump -i awdl0 -n ", You can see names of apple devices near you, even though they do not have WiFi hotspot. (there is some limitations).

    Poništi
  18. proslijedio/la je Tweet
    13. lip 2019.

    New whitepaper: We have delivered our Beacons into a real production networks. To celebrate this milestone of real deployments, we are writing about the lessons learned and experiences gained while working with our early adopters.

    Poništi
  19. proslijedio/la je Tweet
    27. ožu 2019.

    Interesting post from about how to trick your firewall to pass some ICMP packets.

    Poništi
  20. 27. velj 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·