Chris Wysopal

@WeldPond

Co-founder and CTO Veracode. Black Hat Review Board. Former L0pht security researcher. Hackers make trouble.

Boston, MA
Vrijeme pridruživanja: ožujak 2008.

Tweetovi

Blokirali ste korisnika/cu @WeldPond

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @WeldPond

  1. Prikvačeni tweet
    22. lip 2015.

    A disaster foretold — and ignored. L0pht’s warnings about the Internet drew notice but little action

    Poništi
  2. 31. sij

    Forrester Analysis on the State of Government Application Security: Government Must Make Significant Advances

    Poništi
  3. 30. sij

    "The company's U.K.-based reinsurer paid $950,000 US to unlock the hijacked files and is now fighting to get the money back from criminals"

    Poništi
  4. 29. sij

    "The revelation of the breach led to Tissue Regenix’s share price falling by 22%."

    Poništi
  5. 29. sij

    “A great culture will keep people around longer, and it will make hiring easier.” I recently shared some lessons learned throughout the years as a startup founder with :

    Poništi
  6. 29. sij
    Poništi
  7. 29. sij

    Basics data structures

    Poništi
  8. 28. sij
    Poništi
  9. proslijedio/la je Tweet
    28. sij

    DEF CON China Conference Postponed Amid Coronavirus Outbreak

    Poništi
  10. 28. sij

    I'm hiring a Sr. Director of Information Security at . Come work for our amazing infosec team, securing a modern cloud-based SaaS security product business.

    Poništi
  11. 27. sij
    Poništi
  12. 24. sij

    I talked to about how AppSec has grown up. I cover: Factors influencing the change in AppSec programs, What SoSS report uncovers, Why awareness about AppSec risk has grown, but actual risk reduction still has room for improvement

    Poništi
  13. 24. sij

    I was saddened to hear the great journalist Jim Lehrer had passed away. The Jim Lehrer News Hour was one of the 1st national news shows to ask the hacker community and about govt security. Here is the segment "Hacking Around" from 5/8/1998.

    Poništi
  14. 24. sij
    Poništi
  15. 24. sij

    Computer misuse law reform in UK/EU. 👇 "In recent months, this includes (but is not limited to) reviews at a European level, at the National level, reviews within the National Crime Agency, as well as campaigns for reform from those within the cyber security industries."

    Poništi
  16. proslijedio/la je Tweet
    23. sij
    Poništi
  17. 22. sij
    Poništi
  18. 22. sij

    How long is a speaker supposed to last? I have some 25 year old speakers that are great.

    Poništi
  19. 22. sij

    Cyber crimes because computing devices were used. This means even poor toast making could be a cyber crime.

    Poništi
  20. 21. sij

    On the origin of the white hat being the good guys. Kevin Stoehr, co-author of Ride, Boldly Ride: The Evolution of the American Western: “white cowboy hats weren’t particularly realistic. You can imagine how dirty a white hat would have become in the dusty landscape.”

    Poništi
  21. 21. sij

    If my travel plans work out the rest of the day I’m excited to make the 1st NYSEC of 2020.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·