Jerry Bryant

@jnabryant

Product security , Dirt Biker. Tweets are my own

Seattle, Washington
Vrijeme pridruživanja: studeni 2008.

Tweetovi

Blokirali ste korisnika/cu @jnabryant

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jnabryant

  1. 27. sij

    Just published a blog on INTEL-SA-00329 concerning L1D Eviction Sampling. This vulnerability has little to no impact in virtual environments that have applied L1 Terminal Fault mitigations.

    Poništi
  2. 14. sij
    Poništi
  3. 13. sij
    Poništi
  4. 19. stu 2019.
    Poništi
  5. 16. stu 2019.
    Poništi
  6. 12. stu 2019.
    Poništi
  7. proslijedio/la je Tweet
    12. stu 2019.

    With issues during some disclosures, Intel took our concerns *very* seriously and improved the communication and handling of issues *substantially* over the past year. This deserves recognition and I want to thank Intel for improving the process.

    Poništi
  8. proslijedio/la je Tweet

    Coordinated Vulnerability Disclosure works best when done in coordination with the actual vuln discoverer(s). I, too, have seen this improve a great deal in the last year or so.

    Poništi
  9. proslijedio/la je Tweet

    Y'all... CPUs are not simple things. The amount of effort that goes on behind the scenes to fix these things is significant. Brainy people, thinking big thoughts about little things. Coordinating to release on the same day to protect you, so you can read scandalous articles.

    Poništi
  10. 7. stu 2019.

    Being in a panel with some of the smartest people in the PSIRT world at Cisco’s SECCON conference was definitely a great time.

    Poništi
  11. proslijedio/la je Tweet
    15. lis 2019.

    i’ve noticed a trend in infosec to freak out about something and then realize it was not a big deal later. See sudo flaw, apple tencent url thing - just in the last 2 days!! Let’s be better, people!

    Poništi
  12. 10. ruj 2019.
    Poništi
  13. 20. lip 2019.

    From my presentation today. A pic I drew of . Sorry for the bad likeness

    Poništi
  14. 11. lip 2019.

    Back in 2007/08 if you told me that one day ⁦⁩ and I would be working on the same team I would have laughed. Now we are and it’s awesome.

    Poništi
  15. proslijedio/la je Tweet
    14. svi 2019.

    We’ve been hard at work alongside industry-leading developers to deliver more protections. Find software developer guidance here for

    Poništi
  16. proslijedio/la je Tweet

    In our latest update, we disclosed a group of vulnerabilities called Microarchitectural Data Sampling. Learn more about the steps we've taken with our partners to address MDS for products:

    Poništi
  17. 1. ožu 2019.

    Almost 19 years ago I started doing IR work so I'm both sad and excited to be leaving this great organization to start a new adventure with Intel in their IPAS group.

    Poništi
  18. 21. velj 2019.
    Poništi
  19. proslijedio/la je Tweet

    Microsoft’s Cyber Defense Operations Center shares strategy paper with insights into how we work to protect, detect, and respond to cybersecurity threats. Access the paper via our blog. , , , ,

    Poništi
  20. 23. sij 2019.

    To follow up on the work our industry group did on the Product Security Incident Response Team (PSIRT) Services Framework, has now published our PSIRT maturity document. Was awesome to collaborate with great people to create this.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·