Tweets
- Tweets
- Tweets & replies
- Media
@jefftrower is blocked
Are you sure you want to view these Tweets? Viewing Tweets won't unblock @jefftrower.
-
Attribution is hard. Rock solid attribution is almost impossible.Pretending you'll ever have all evidence for attribution is just delusional
-
Security is about architecture... Not single tools. AV bypass Webcast tomorrow at 1 EST: https://attendee.gotowebinar.com/register/9167970224427482628?source=Twitter …
-
Dell SonicWALL Secure Mobile Access SMA 8.1 - Cross-Site Scripting / Cross-Site Request Forgery https://www.exploit-db.com/exploits/40978/
#infosec -
"sslscan – Detect SSL Versions & Cipher Suites (Including TLS)" http://www.darknet.org.uk/2016/12/sslscan-detect-ssl-versions-cipher-suites-including-tls/ …
#infosec -
It's the holidays, hiring is slow. There are still infosec folks who need work. Please use this tweet to post reqs, or seek work or aid &RT.
-
This, all of us should read this and make 1 small change based on this advicehttps://twitter.com/hacks4pancakes/status/803756988400332800 …
-
Disaster... "Trump’s plan to defund NASA’s climate research is. . . yikes" http://www.popsci.com/trumps-plan-to-defund-nasas-earth-sciences-division-would-leave-hole-in-climate-research …
#science -
"Six key principles for efficient cyber investigations" https://www.helpnetsecurity.com/2016/11/23/principles-efficient-cyber-investigations/ …
#infosec -
"Securing Communications in a Trump Administration" https://www.schneier.com/blog/archives/2016/11/securing_commun.html …
#infosec#informationsecurity -
"Elegant 0-day unicorn underscores “serious concerns” about Linux security" http://arstechnica.com/security/2016/11/elegant-0day-unicorn-underscores-serious-concerns-about-linux-security/?amp=1 …
#informationsecurity#infosec -
Software inventory is Critical Security Control #2. You can't hope to monitor threats when software you don't know about is installed.
-
Hardware inventory is Critical Security Control #1. You can't monitor what you don't know about and inventory is tied to staffing levels.
-
I noticed there is no good visualization of the real Information Security triad, so i made one. You're welcome.
#infosecpic.twitter.com/BAJvOIpVsh
-
Wow. Enlightening read. Thanks for sharing
@jepayneMSFThttps://twitter.com/jepayneMSFT/status/796069316135424000 … -
How forensics really works. AKA: how the FBI can really get through so many emails so "quickly": http://malwarejake.blogspot.com/2016/11/how-forensics-really-works-post-for-my.html …
-
Huge # of people have told me how PowerShell transformed their careers by making them heros & getting them raises/promos/new jobs.https://twitter.com/joshduffney/status/795631902959030272 …
-
I'd tell you to delete your account, but the mysteries of the delete function in a modern computer probably frighten and confuse you. https://twitter.com/BernardKerik/status/795389573853573122 …
This Tweet is unavailable. -
"If you don't read the newspaper, you're uninformed. If you read the newspaper, you're misinformed." -Mark Twainpic.twitter.com/1joMqvmxkG
-
jefftrower followed Jez Humble, haxorthematrix, EasyCrypt and 23 others
-
@jezhumble
Co-author of Continuous Delivery, Lean Enterprise, DevOps Handbook. Infrastructure
@18F, lecturer@BerkeleyISchool. PGP: https://keybase.io/jezhumble -
@haxorthematrix
Paul's Security Weekly Podcast and Blog, dedicated to providing the latest information security news, hacking and research. Haxor of things at InGuardians.
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
Jake Williams
strandjs
jefftrower
Lesley
Daniel Schatz
Jeffrey Snover
Wil Wheaton
Weird History