Preskoči na sadržaj
Korištenjem servisa na Twitteru pristajete na korištenje kolačića. Twitter i partneri rade globalno te koriste kolačiće za analize, personalizaciju i oglase.

Za najbolje sučelje na Twitteru koristite Microsoft Edge ili instalirajte aplikaciju Twitter iz trgovine Microsoft Store.

  • Naslovnica Naslovnica Naslovnica, trenutna stranica.
  • O Twitteru

Spremljena pretraživanja

  • obriši
  • U ovom razgovoru
    Ovjeren akauntZaštićeni tweetovi @
Predloženi korisnici
  • Ovjeren akauntZaštićeni tweetovi @
  • Ovjeren akauntZaštićeni tweetovi @
  • Jezik: Hrvatski
    • Bahasa Indonesia
    • Bahasa Melayu
    • Català
    • Čeština
    • Dansk
    • Deutsch
    • English
    • English UK
    • Español
    • Filipino
    • Français
    • Italiano
    • Magyar
    • Nederlands
    • Norsk
    • Polski
    • Português
    • Română
    • Slovenčina
    • Suomi
    • Svenska
    • Tiếng Việt
    • Türkçe
    • Български език
    • Русский
    • Српски
    • Українська мова
    • Ελληνικά
    • עִבְרִית
    • العربية
    • فارسی
    • मराठी
    • हिन्दी
    • বাংলা
    • ગુજરાતી
    • தமிழ்
    • ಕನ್ನಡ
    • ภาษาไทย
    • 한국어
    • 日本語
    • 简体中文
    • 繁體中文
  • Imate račun? Prijava
    Imate račun?
    · Zaboravili ste lozinku?

    Novi ste na Twitteru?
    Registrirajte se
Profil korisnika/ce clintgibler
Clint Gibler
Clint Gibler
Clint Gibler
@clintgibler

Tweets

Clint Gibler

@clintgibler

Technical Director / Research Director @NCCsecurityUS. 💙 #DevSecOps and automated bug finding. BSidesLV/AppSec Cali/DevSecCon/CactusCon/Shellcon review board

San Francisco, CA
tldrsec.com
Vrijeme pridruživanja: srpanj 2012.

Tweets

  • © 2020 Twitter
  • O Twitteru
  • Centar za pomoć
  • Uvjeti
  • Pravila o privatnosti
  • Imprint
  • Kolačići
  • Informacije o oglasima
Odbaci
Prethodni
Sljedeće

Idite na profil osobe

Spremljena pretraživanja

  • obriši
  • U ovom razgovoru
    Ovjeren akauntZaštićeni tweetovi @
Predloženi korisnici
  • Ovjeren akauntZaštićeni tweetovi @
  • Ovjeren akauntZaštićeni tweetovi @

Odjava

Blokiraj

  • Objavi Tweet s lokacijom

    U tweetove putem weba ili aplikacija drugih proizvođača možete dodati podatke o lokaciji, kao što su grad ili točna lokacija. Povijest lokacija tweetova uvijek možete izbrisati. Saznajte više

    Vaši popisi

    Izradi novi popis


    Manje od 100 znakova, neobavezno

    Privatnost

    Kopiraj vezu u tweet

    Ugradi ovaj Tweet

    Embed this Video

    Dodajte ovaj Tweet na svoje web-mjesto kopiranjem koda u nastavku. Saznajte više

    Dodajte ovaj videozapis na svoje web-mjesto kopiranjem koda u nastavku. Saznajte više

    Hm, došlo je do problema prilikom povezivanja s poslužiteljem.

    Integracijom Twitterova sadržaja u svoje web-mjesto ili aplikaciju prihvaćate Twitterov Ugovor za programere i Pravila za programere.

    Pregled

    Razlog prikaza oglasa

    Prijavi se na Twitter

    · Zaboravili ste lozinku?
    Nemate račun? Registrirajte se »

    Prijavite se na Twitter

    Niste na Twitteru? Registrirajte se, uključite se u stvari koje vas zanimaju, i dobivajte promjene čim se dogode.

    Registrirajte se
    Imate račun? Prijava »

    Dvosmjerni (slanje i primanje) kratki kodovi:

    Država Kod Samo za korisnike
    Sjedinjene Američke Države 40404 (bilo koje)
    Kanada 21212 (bilo koje)
    Ujedinjeno Kraljevstvo 86444 Vodafone, Orange, 3, O2
    Brazil 40404 Nextel, TIM
    Haiti 40404 Digicel, Voila
    Irska 51210 Vodafone, O2
    Indija 53000 Bharti Airtel, Videocon, Reliance
    Indonezija 89887 AXIS, 3, Telkomsel, Indosat, XL Axiata
    Italija 4880804 Wind
    3424486444 Vodafone
    » Pogledajte SMS kratke šifre za druge zemlje

    Potvrda

     

    Dobro došli kući!

    Vremenska crta mjesto je na kojem ćete provesti najviše vremena i bez odgode dobivati novosti o svemu što vam je važno.

    Tweetovi vam ne valjaju?

    Prijeđite pokazivačem preko slike profila pa kliknite gumb Pratim da biste prestali pratiti neki račun.

    Kažite mnogo uz malo riječi

    Kada vidite Tweet koji volite, dodirnite srce – to osobi koja ga je napisala daje do znanja da vam se sviđa.

    Proširite glas

    Najbolji je način da podijelite nečiji Tweet s osobama koje vas prate prosljeđivanje. Dodirnite ikonu da biste smjesta poslali.

    Pridruži se razgovoru

    Pomoću odgovora dodajte sve što mislite o nekom tweetu. Pronađite temu koja vam je važna i uključite se.

    Saznajte najnovije vijesti

    Bez odgode pogledajte o čemu ljudi razgovaraju.

    Pratite više onoga što vam se sviđa

    Pratite više računa da biste dobivali novosti o temama do kojih vam je stalo.

    Saznajte što se događa

    Bez odgode pogledajte najnovije razgovore o bilo kojoj temi.

    Ne propustite nijedan aktualni događaj

    Bez odgode pratite kako se razvijaju događaji koje pratite.

    Clint Gibler‏ @clintgibler 16. sij
    • Prijavi Tweet

    I watched all 44 @owasp @AppSecCali 2019 talks (~32 hours of video) and wrote detailed summaries for you 📚 Learn about #DevSecOps, scaling security, threat modeling, building a security program, & more.https://tldrsec.com/blog/appsec-cali-2019/ …

    08:20 - 16. sij 2020.
    • 176 proslijeđenih tweetova
    • 400 oznaka „sviđa mi se”
    • Erica Acton iwundu chinonso Christian Almenar Tash Norris Graf Kolibri Winston Chan Josh Wang Danielle K. Owen ashar
    6 replies 176 proslijeđenih tweetova 400 korisnika označava da im se sviđa
      1. Novi razgovor
      2. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        The talks covered a wide range of topics, including: * Threat modeling * Protecting user accounts * Scaling #appsec * Building a defensible cloud env * #Kubernetes security * Securing third-party apps (Slack bots, Salesforce AppExchange) * Cyber war and geopolitics * Tools &more

        1 reply 0 proslijeđenih tweetova 3 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      3. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        I'll give you a quick blurb about each, starting with my top 10 favorite talks 😍 Note: talks are listed alphabetically within each category, not by order of preference.

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      4. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @HelloArbit & Esha Kanekar on how the Netflix #AppSec team scales their security efforts🚀 * Paved Road * Long term trust-based relationships * Vuln metrics via #bugbounty, tools, pen tests * Combine security team asks into 1 doc * Automated risk classification * Asset Inventorypic.twitter.com/a5Pwejj7Fv

        1 reply 1 proslijeđeni tweet 3 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      5. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @adamshostack describes how security can earn its seat at the development table: * Be consistent in recommendations * Adapt to the situation (e.g. if lightweight approach is needed) * Soft skills - respect, active listening, assume good intent, embrace diversitypic.twitter.com/wRx864TvBX

        1 reply 1 proslijeđeni tweet 6 korisnika označava da im se sviđa
        Prikaži ovu nit
      6. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        Cyber insurance got you in tizzy? @thedeadrobots gives a whirlwind tour of the insurance industry, where it is today, and the terms and players you should know. Example cyber insurance policies, what to watch out for, all in a super fun talk 💯🤘

        1 reply 3 proslijeđena tweeta 5 korisnika označava da im se sviđa
        Prikaži ovu nit
      7. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @Koen_Hendrix on * Ranking @riotgames dev teams by security maturity * Measuring impact of sec maturity via #bugbounty data * Scale #threatmodelling by adding this to sprint planning: > How can a malicious user intentionally abuse this functionality? How can we prevent that?pic.twitter.com/cHGNqAOkAo

        1 proslijeđeni tweet 4 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      8. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        Learn how Netflix, Dropbox, Datadog, Snap, and DocuSign think about security 🚀 A masterclass in DevSecOps and modern AppSec best practices ✅ Feat the wisdom of @astha_singhal @frgx @Divya_Dw @dugdep (and yours truly 😎) Full summary here:https://tldrsec.com/blog/appsec-cali-2019-lessons-learned-from-the-devsecops-trenches/ …

        1 reply 1 proslijeđeni tweet 5 korisnika označava da im se sviđa
        Prikaži ovu nit
      9. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @travismcpeak & @__muscles give an overview of efforts Netflix has undertaken to scale eir cloud security * Segmentation * Removing static keys * Auto-least privilege of AWS permissions * Extensive tooling for dev UX * Anomaly detection * Protecting AWS creds * + future plans

        1 reply 0 proslijeđenih tweetova 5 korisnika označava da im se sviđa
        Prikaži ovu nit
      10. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @fredrickl teaches us how to make our AppSec program #swole with the big 3 "lifts"💪 for #AppSec: 1. Code reviews 2. Secure code training 3. Threat modeling Also: * How to prioritize your efforts * How/when to use automation * Common pitfalls to avoid * This buff babypic.twitter.com/K7oz7c9Zwx

        1 reply 0 proslijeđenih tweetova 4 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      11. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        Masterclass by @hongyihu in the thought process behind & technical details of building scalable defenses; in this case, a proxy to protect heterogeneous internal web applications. * Agnostic to backend tech * Central place to build defenses into * Emphasis on frictionless dev UXpic.twitter.com/T6wRBjxwD2

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      12. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @ejcx_ on what it's like being the first security hire at a startup (@segment @Cloudflare) * How to be successful (relationships, culture, compromise & continuous improvement) * What should inform your priorities * Where to focus to make an immediate impact * Time sinks to avoidpic.twitter.com/Pkm1AHkWiD

        1 reply 2 proslijeđena tweeta 5 korisnika označava da im se sviđa
        Prikaži ovu nit
      13. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @leifdreizler on practical, real-world tested advice on effectively working with devs and: * Building a security team/program * Making dev security training fun * #bugbounty program protips * Successfully implementing a security vendor * Security ➡️ Engineering embed programpic.twitter.com/aaLquTpbgx

        1 reply 2 proslijeđena tweeta 3 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      14. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        Why can't you get an airline seat, see your favorite band, and your "new" giftcard is empty? Bots! 🤖 @kgosschalk describes why preventing account takeovers is hard, gives examples of sites bots attack & how, and recommends how to prevent account takeovers.

        1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđa
        Prikaži ovu nit
      15. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        Julien Sobrier and Ping Yan on how Salesforce uses browser fingerprinting to protect user account compromise, including by malware running on the same device as the victim. Shannon entropy is calculated on browser fingerprints, diffed over time, weighted by likelihood/magnitudepic.twitter.com/xb74kNEvP3

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      16. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @kelleyrobinson discusses her experiences calling in to 30 different call centers: * What info they requested to authenticate her * What they did well 👍 * What they did poorly 😆😱 * Recs for designing more secure call center authentication protocols 🛡️pic.twitter.com/mvQioBXFVN

        1 reply 2 proslijeđena tweeta 4 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      17. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @dontlivetwice describes how @Pinterest protects users whose creds have leaked in 3rd party breaches 1. Ingest breach info 2. Determine creds matching Pinterest users 3. Tag matched accounts as high risk 4. Protect accounts via programmatic and user-based actionspic.twitter.com/ZD069hu5LS

        1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđa
        Prikaži ovu nit
      18. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        Hear five CISOs share their perspectives on: 🧁 Baking security into the SDLC 🚀 DevSecOps 🏹 Security testing (DAST/SAST/bug bounty/pen testing) 📚 Security training and more! Featuring @RAGreenberg, @coleencoolidge, Martin Mazor, Bruce Phillips, and Shyama Rose.

        1 reply 0 proslijeđenih tweetova 0 korisnika označava da im se sviđa
        Prikaži ovu nit
      19. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        Kristen Pascale and Tania Ward of Dell EMC describe: * What a PSIRT team is * Dell's PSIRT team's workflow * Common challenges * And how PSIRT teams can work earlier in the SDLC with development teams to develop more secure applications

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      20. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @appsecneil gives an overview of: * cryptocurrencies & cryptocurrency exchanges * The attacks exchanges face (app layer, wallets, user accounts, currencies themselves) * The defenses they've put in place to mitigate these attackspic.twitter.com/KpWRnsJ2WJ

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      21. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        Alexandra Nassar on how to create a positive vuln management culture & process that works for devs & security team 💑 * Meet w/ devs to understand their workflow & pain points * Use dev systems for vuln mgmt. External tools => too much friction * Use a single standard workflow

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      22. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        Brandon Sherman discussed his #AWS forensics experiment: * Do EBS volume snapshots only contain in-use blocks? * Does EBS volume type matter? * Does instance type matter? (e.g. NVMe vs SATA) + chain of custody and cloud security best practices ☁️🔒

        1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđa
        Prikaži ovu nit
      23. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @__muscles: how to detect when your AWS creds have been compromised & are used outside of ur env, & how to prevent them from being stolen in the first place. * https://github.com/Netflix-Skunkworks/aws-credential-compromise-detection … * Example proxy to block SSRF metadata service attacks: https://github.com/Netflix-Skunkworks/aws-metadata-proxy …pic.twitter.com/hq6nc2IipI

        1 reply 0 proslijeđenih tweetova 3 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      24. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @Lsitaraman describes: * The history of authz implementation approaches * The value of externalizing authz from main app code * Authz in #Kubernetes * The power of using Open Policy Agent (@OPA) for authz with Kubernetes and @ISTIOpic.twitter.com/hhf7X7kBN2

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      25. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @omerlh describes his quest to find a secrets management solution that: ✅ Supports GitOps workflows ✅ Kubernetes native ✅ Strong security properties Which lead to the development of a new tool, Kamus:https://github.com/Soluto/kamus/ 

        1 proslijeđeni tweet 3 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      26. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @_sarahyo on: * Container and #Kubernetes best practices * Insecure defaults to watch out for And what happens when you do everything wrong and make your container or K8s publicly available on the Internet 🔥☠️

        1 reply 1 proslijeđeni tweet 5 korisnika označava da im se sviđa
        Prikaži ovu nit
      27. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @bdpsecurity's "Fail, Learn, Fix" keynote discussed the history & evolution of the electrical, computer, & security industries. The way forward for security is: * Sharing knowledge & failures 💡 * Creating standard security patterns that devs can easily apply 🧵pic.twitter.com/N90VYvONTc

        1 reply 0 proslijeđenih tweetova 2 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      28. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @__apf__ Solving hard security problems requires tough tradeoffs. 1. Chip away at more tractable subproblems 2. Accept imperfection & criticism 3. Pay off debt over time - reduce the cost that decision may have made e.g. Chrome site isolation, HTTP padlock, displaying URLspic.twitter.com/7rICFojSVK

        1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđa
        Prikaži ovu nit
      29. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        A rousing history of security by @manicode, including the history of testing, OWASP projects, XSS, & important dates in AppSec. "Things are getting a lot better, & we should be proud of what we've done" + some humorous/aspirational predictions about the future of security 😂pic.twitter.com/HkVzbQceFP

        1 proslijeđeni tweet 4 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      30. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @SecEvangelism gives the low down on what it's like to grab a bunch of EU diplomats, put them in a room, and run them through cyber warfare scenarios. This was a fascinating discussion of the interactions between technology, computer security,conomics, and geopolitics 👍💯pic.twitter.com/9cSZl8qGOw

        3 proslijeđena tweeta 6 korisnika označava da im se sviđa
        Prikaži ovu nit
      31. Clint Gibler‏ @clintgibler 16. sij
        • Prijavi Tweet

        @mkcop describes best practices for securely running unsafe third-party executables: 1. Profile the executable (strace) -> seccomp-bpf profile 2. Harden your app - input validation, examine magic bytes 3. Secure the processing pipeline - leverage sandboxing, secure network designpic.twitter.com/AUPfD81pPe

        1 reply 0 proslijeđenih tweetova 1 korisnik označava da mu se sviđa
        Prikaži ovu nit
      32. Još 17 drugih odgovora

    Čini se da učitavanje traje već neko vrijeme.

    Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

      Sponzorirani tweet

      false

      • © 2020 Twitter
      • O Twitteru
      • Centar za pomoć
      • Uvjeti
      • Pravila o privatnosti
      • Imprint
      • Kolačići
      • Informacije o oglasima