Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @julientouche
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @julientouche
-
Julien Touche proslijedio/la je Tweet
More than ever, Security is a function of implementing safe progressive defaults that are free, hardening perimeter authentication with 2FA, and monitoring what can’t be perfectly fixed. It doesn’t require millions of dollars. But it is difficult without perspective and support.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
So many of you have asked me “what can I do to help?”, being on the other side of the world and all. Well, here’s a thoughtful and useful message just for you. Please share


IG:
@bxearth
#AustraliaFires#AustraliaOnFire#PrayForAustralia#KoalasNotCoal#NSWfirespic.twitter.com/9TAu6P9epSHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
Well, you wanted a fun rant about
#SOC failures? Here:https://medium.com/anton-on-security/beware-clown-grade-socs-still-abound-7b6b9d1f9304?sk=7a705d9335c4faf087242f665db7c587 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
Some parting advice: set these goals for your security team in 2020.
#reInventpic.twitter.com/0xdXR4X6x3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
An Overlooked but Intriguing Sigma Use Case
#SIEM#DevOps#SecOps#SecurityMonitoringhttps://medium.com/@cyb3rops/an-overlooked-but-intriguing-sigma-use-case-221987f7b588 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
Next in
#PingCastle Finally merged permission/"control path"/"bloodhound light" analysis into the healthcheck report. Beta testers needed & feedback welcomed (support@pingcastle.com) No more excuse to get your domain compromised in 1 minute.pic.twitter.com/JJ4UfpthlKHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
Workers: WOW, we’re exhausted, burned out, and kinda depressed. What if you paid us more money, let us work fewer hours, and gave us better benefits? Employer: ROBOT THERAPYpic.twitter.com/MHY1gI83to
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
Please RT for reach: What do the words "cyber range" mean to you? Who should have one? Should they lease access or own it? How should it be used? How do you quantify the value proposition? Please reply with your answer to any or all.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
Very senior engineers assume that people know that software isn't secure by default. Less experienced people trust the work and word of the same senior engineers, and assume their silence to mean that software *is* secure by default. This is an actual problem.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
So... found that she just posted another Medium article a few days ago about getting deplatformed... reading now but I think signal boosting couldn't hurt
#bringnaomibackhttps://medium.com/@therealsexycyborg/shenzhen-tech-girl-naomi-wu-part-3-defunding-deplatforming-and-detention-140fed4b9554 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
TIL By default,
#Kubernetes disables the@Docker default Seccomp profile that@jessfraz worked so hard on. Several K8s cloud providers don’t override that setting, making their containers completely insecure by default, requiring pod level config.https://kubernetes.io/docs/concepts/policy/pod-security-policy/#seccomp …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
My
#MSIgnite talk slides for "Top Ten Active Directory Security issues, impact, & remediation" posted on http://ADSecurity.org . Thank you to everyone who joined me and overflowed the theater! Link to talk recording (audio with slides synched) as well. https://adsecurity.org/?page_id=1352 https://twitter.com/PyroTek3/status/1191120340199596032 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
RT
@Philip_Salter: Taavi Kotka , former CIO of Estonia, on the low £100m price tag for being the most tech-savvy government in the world: “If you don’t use Accenture or McKinsey, you’d be amazed at what you can get done.” > “Another ingredient: keep politicians out of it. ”Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
Very excited to announce the next evolution of IR
@Cisco! We are now part of@TalosSecurity - Cisco Talos Incident Response (CTIR)! http://cs.co/60121KsV2 To make this day even sweeter, I’m going to personally donate $1 for each RT/share (up to $5k) towards STEM scholarships.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
80% of
#DOES19 in .0002% of the slides@CatSwetelpic.twitter.com/n4gVNGnlSk
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
The coolest chart I saw at
#ATTACKcon yesterday: techniques covered by data source (thanks@andyplayse4)! Though there's some nuance/interpretation required here, overall this helps make a great case for the importance of process creation logging and many network data sources.pic.twitter.com/pfNC8mI6dp
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
YES! Important. Sources are only 1/3 of the value of
#threatintel. There are three components of evaluating the value of an intelligence production unit (e.g. vendor): 1. Data sources 2. Contextual analysis 3. Relevant Actionable Recommendations#infosec#cybersecurityhttps://twitter.com/BrianPKime/status/1189205793599639552 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
What makes a good life? Lessons from the longest study on happiness: http://t.ted.com/EH2S9tD pic.twitter.com/kuuNAnPi2q
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
L'APMEP a décidé de diffuser largement un article de Gilles Dowek, véritable plaidoyer pour l'enseignement des sciences de l'école au lycée. A lire sur Au Fil des Maths :https://afdm.apmep.fr/rubriques/opinions/des-pistes-pour-sortir-de-la-crise-de-lenseignement-des-sciences/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Touche proslijedio/la je Tweet
Volatility 3! Aw yiss!!! - Written in Python 3
- Major performance boost
- No more freaking --profile anymore!
- Proper Wow64 support
- And much, much more.
pic.twitter.com/wmRuUmdgxA
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.