Dr. Anton ChuvakinOvjeren akaunt

@anton_chuvakin

Information security - , , ... formerly VP & Distinguished Analyst at Gartner! Now doing security product strategy

San Jose, CA
Vrijeme pridruživanja: siječanj 2008.

Tweetovi

Blokirali ste korisnika/cu @anton_chuvakin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @anton_chuvakin

  1. proslijedio/la je Tweet
    prije 16 sati
    Odgovor korisnicima
    Poništi
  2. proslijedio/la je Tweet
    prije 18 sati
    Odgovor korisnicima

    IMO respectful critique is the way. 90% of our community has gallows humor about their own marketing, understands it's bad, but does what works. We need to design a market in which dishonest signaling works worse than honest signaling; how do we do that is the discussion.

    Poništi
  3. proslijedio/la je Tweet
    prije 18 sati
    Odgovor korisnicima

    Totally get why you're being defensive, and I'm fully aware of the prior art. But it doesn't change the fact that *any company* should lead with an accessible value prop and then back it up with tech, not lead with exaggeratedly-stated tech that ignores customer problems

    Poništi
  4. proslijedio/la je Tweet

    A solid 10% of being an engineering manager is asking two people if they've talked to each other yet

    Poništi
  5. proslijedio/la je Tweet
    prije 21 sat
    Odgovor korisnicima

    There are sooooooo many bad MSSPs though. When Savage Security was a thing, we’d test people’s MSSPs and saw a 100% failure rate in detection, even when we were downloading live malware, EICAR, touching Wannacry kill switch. Depressing is right.

    Poništi
  6. They "are actually using the public cloud have simply figured out how to replicate their data center, in someone else’s data center. Minus all that hardened perimeter security folks are used to." (from: )

    Poništi
  7. For some reason, lately I've been liking posts more and more. Here is another real gem:

    Poništi
  8. proslijedio/la je Tweet
    3. velj

    I'm making a private side project slightly more public today, with the 1st video of "Return Oriented." In it, I review an anon infosec startup's marketing, and by review I mean throw tons of shade and call out all the buzzword bs. Prepare for eyerolls.

    Poništi
  9. This depressing tweet reminds us that some problems are just, well, hard :-)

    Poništi
  10. 2002 customers: we have the data, we lack the insights 2002 vendors: of course, this is what we do 2010 c: we have the data, we lack the insights 2010 v: of course, this is what we do 2020 c: we have the data, we lack the insights 2020 v: of course, this is what we do :-(

    Poništi
  11. proslijedio/la je Tweet
    29. sij

    I wrote up this analysis on the question I posed yesterday, and the subsequent word-cloud that got built from your data... (see Latest) Comments and further analysis welcome!

    Poništi
  12. Poništi
  13. proslijedio/la je Tweet
    29. sij

    Finding the right mix of people, tooling, and data is hard. However, I personally lean more towards enabling an expert to be efficient than I do towards adding hands. Of course there's a point where you've maximized the sustainable capacity of a single expert.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    3. velj

    Today I was asked to send a fax, my counteroffer for "secure" guaranteed transmission of the data by carrier pigeon was rejected. How rude!

    Poništi
  15. proslijedio/la je Tweet
    2. velj
    Odgovor korisniku/ci

    That's gotta be obnoxious as hell. Here you are trying to exfil documents for industrial espionage, and someone else just rolls up and encrypts it all for a cash grab. It's like the getaway driver for a bank heist getting carjacked while they're waiting.

    Poništi
  16. proslijedio/la je Tweet
    2. velj

    If you're a foreign intelligence entity, your targets getting ransomed in the middle of your operation is now definitely in your threat model. RYUK deployments against defense contractors. This is 2020. Scraping the bottom of intrusion operations objectives. Absolutely lit.

    Poništi
  17. proslijedio/la je Tweet
    1. velj

    The biggest struggle I see from people transitioning from highly technical individual contributor roles to management roles is balancing their desire to remain technical while investing in things that are imperative to being a well rounded leader. That struggle is very real.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    1. velj
    Poništi
  19. proslijedio/la je Tweet
    31. sij

    The fact that malware created over a decade ago is in the top 3 detected in 2019 should help illustrate the crumbling aqueduct off technical debt that still festers unpaid in today’s Internet.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    29. sij
    Odgovor korisnicima i sljedećem broju korisnika:

    There was a great podcast for startups with , and others on a few years ago

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·