Julien Touche

@julientouche

Security/IT Consultant

Vrijeme pridruživanja: rujan 2009.

Tweetovi

Blokirali ste korisnika/cu @julientouche

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @julientouche

  1. proslijedio/la je Tweet
    12. sij

    More than ever, Security is a function of implementing safe progressive defaults that are free, hardening perimeter authentication with 2FA, and monitoring what can’t be perfectly fixed. It doesn’t require millions of dollars. But it is difficult without perspective and support.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet

    So many of you have asked me “what can I do to help?”, being on the other side of the world and all. Well, here’s a thoughtful and useful message just for you. Please share 🙏🏻🐨🌿 IG:📸 @bxearth

    Poništi
  3. proslijedio/la je Tweet
    Poništi
  4. proslijedio/la je Tweet

    Some parting advice: set these goals for your security team in 2020.

    Poništi
  5. proslijedio/la je Tweet
    1. pro 2019.
    Poništi
  6. proslijedio/la je Tweet

    Next in Finally merged permission/"control path"/"bloodhound light" analysis into the healthcheck report. Beta testers needed & feedback welcomed (support@pingcastle.com) No more excuse to get your domain compromised in 1 minute.

    Poništi
  7. proslijedio/la je Tweet
    27. stu 2019.

    Workers: WOW, we’re exhausted, burned out, and kinda depressed. What if you paid us more money, let us work fewer hours, and gave us better benefits? Employer: ROBOT THERAPY

    Screenshot of an email from an employer offering use of an “Emotional Support Chatbot”
    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    27. stu 2019.

    Please RT for reach: What do the words "cyber range" mean to you? Who should have one? Should they lease access or own it? How should it be used? How do you quantify the value proposition? Please reply with your answer to any or all.

    Poništi
  9. proslijedio/la je Tweet
    22. stu 2019.

    Very senior engineers assume that people know that software isn't secure by default. Less experienced people trust the work and word of the same senior engineers, and assume their silence to mean that software *is* secure by default. This is an actual problem.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    15. stu 2019.
    Odgovor korisniku/ci

    So... found that she just posted another Medium article a few days ago about getting deplatformed... reading now but I think signal boosting couldn't hurt

    Poništi
  11. proslijedio/la je Tweet
    12. stu 2019.

    TIL By default, disables the default Seccomp profile that worked so hard on. Several K8s cloud providers don’t override that setting, making their containers completely insecure by default, requiring pod level config.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    10. stu 2019.

    My talk slides for "Top Ten Active Directory Security issues, impact, & remediation" posted on . Thank you to everyone who joined me and overflowed the theater! Link to talk recording (audio with slides synched) as well.

    Poništi
  13. 6. stu 2019.

    RT : Taavi Kotka , former CIO of Estonia, on the low £100m price tag for being the most tech-savvy government in the world: “If you don’t use Accenture or McKinsey, you’d be amazed at what you can get done.” > “Another ingredient: keep politicians out of it. ”

    Poništi
  14. proslijedio/la je Tweet
    5. stu 2019.

    Very excited to announce the next evolution of IR ! We are now part of - Cisco Talos Incident Response (CTIR)! To make this day even sweeter, I’m going to personally donate $1 for each RT/share (up to $5k) towards STEM scholarships.

    Poništi
  15. proslijedio/la je Tweet
    30. lis 2019.

    80% of in .0002% of the slides

    Poništi
  16. proslijedio/la je Tweet
    29. lis 2019.

    The coolest chart I saw at yesterday: techniques covered by data source (thanks )! Though there's some nuance/interpretation required here, overall this helps make a great case for the importance of process creation logging and many network data sources.

    Poništi
  17. proslijedio/la je Tweet
    29. lis 2019.

    YES! Important. Sources are only 1/3 of the value of . There are three components of evaluating the value of an intelligence production unit (e.g. vendor): 1. Data sources 2. Contextual analysis 3. Relevant Actionable Recommendations

    Poništi
  18. proslijedio/la je Tweet
    23. pro 2015.

    What makes a good life? Lessons from the longest study on happiness:

    Poništi
  19. proslijedio/la je Tweet
    17. lis 2019.

    L'APMEP a décidé de diffuser largement un article de Gilles Dowek, véritable plaidoyer pour l'enseignement des sciences de l'école au lycée. A lire sur Au Fil des Maths :

    Poništi
  20. proslijedio/la je Tweet
    16. lis 2019.

    Volatility 3! Aw yiss!!! - Written in Python 3 🐍 - Major performance boost 👍 - No more freaking --profile anymore! ♥ - Proper Wow64 support 🤝 - And much, much more. 😎

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·