Gordon Chaffee

@gordonchaffee

Any opinions stated here are my own, not those of my employer.

Vrijeme pridruživanja: svibanj 2013.

Tweetovi

Blokirali ste korisnika/cu @gordonchaffee

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @gordonchaffee

  1. proslijedio/la je Tweet
    21. pro 2019.

    Here is what fraudsters really are doing and have been for years: credential stuffing. It’s boring, unsexy, but it’s like printing money. They get access to someone’s email account, search for emails from services they can turn access to into money, then do that.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet

    Introducing a whitepaper about BeyondProd, which explains the model for how we implement cloud-native security at Google →

    Poništi
  3. proslijedio/la je Tweet
    17. pro 2019.

    So, earlier today, Google published a whitepaper on 🌟BeyondProd🌟, about how Google does cloud-native security. Here’s a summary thread /1

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    18. pro 2019.

    Now that Google has released more info on how they run their prod environment (BeyondProd / cloud-native security), you can start to ask your SaaS vendors how far their environment is from that.

    Poništi
  5. proslijedio/la je Tweet
    18. lis 2019.
    Poništi
  6. proslijedio/la je Tweet
    23. ruj 2019.

    I keep re-reading the CCPA and I'm sure some of my bafflement is due to not being a lawyer, but the loopholes built into this thing are surprising and the random contradictory sections are 🤯.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    20. ruj 2019.

    RSA factoring recap since shady people are making dumb claims right now. Caveat: They used to use decimal digits for RSA key lengths, so "RSA-100" was 330 bits. 1. 256-bit RSA keys were factorable in the 1980s.

    Prikaži ovu nit
    Poništi
  8. 8. ruj 2019.

    "infosec is largely averse to compromise due to ... 'security purity' ... the almost moralistic sense among some security professionals that any risk acceptance is unacceptable" says . Agree. Use smart risk management instead. Good read:

    Poništi
  9. 8. ruj 2019.

    "To mitigate security threats, Zettlemoyer believes that security enterprises need to focus on their security hygiene". Strongly agree.

    Poništi
  10. proslijedio/la je Tweet
    30. kol 2019.
    Poništi
  11. 15. kol 2019.

    Fantastic thread by of major problems in security and why the blame approach is broken if we really want to fix the hard problems. Agreed on needing the NTSB equivalent for security and privacy.

    Poništi
  12. 6. kol 2019.

    Nice guidance that leads to encourages a broader set of perspectives. And it is getting to be perf time at Google too...

    Poništi
  13. 6. kol 2019.

    Best practices for Kubernetes security (and some identified vulnerabilities) from the CNCF based on good work of and :

    Poništi
  14. 6. kol 2019.

    Motivated insiders are a challenging vector for security, but a strong security program needs to account for them.

    Poništi
  15. proslijedio/la je Tweet
    26. srp 2019.

    GCP has so much functionality these days that you need a guide, so here's a one-page guide to GCP.

    Poništi
  16. 20. srp 2019.
    Poništi
  17. 19. svi 2019.

    Informative thread from ex-Google privacy leader about no Google government backdoors but compliance with US laws that require targeted wiretapping (and other challenges).

    Poništi
  18. 7. svi 2019.

    @LeaKisnner's wise approach to thoughtful privacy regulation based on many years of experience and taking on hard problems.

    Poništi
  19. proslijedio/la je Tweet

    Runnable formal model of ARM v8.5: Good enough to boot Linux!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·