Olli

@ollijarva

Application Security enthusiast in Asia, Singapore.

Asia, Singapore
Vrijeme pridruživanja: kolovoz 2010.

Tweetovi

Blokirali ste korisnika/cu @ollijarva

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ollijarva

  1. proslijedio/la je Tweet
    9. pro 2019.

    article by : How we turned 5G into 5k. Lesson: keep it simple and stick to basics!

    Poništi
  2. proslijedio/la je Tweet

    About to give my preliminary 2020 talk for Security Week.

    Poništi
  3. proslijedio/la je Tweet

    Want to learn about how to apply the Application Security Verification Standard for your dev teams, code review, QA or penetration testing? Plenty of spots left. If you wanted to but can’t attend, pls let me know what might have helped you attend.

    Poništi
  4. proslijedio/la je Tweet
    Poništi
  5. proslijedio/la je Tweet

    If you wondered why NIST 800-63, and deprecated SMS "authentication", and why you should immediately move to push authentication or better, read this. We can't trust carriers, so we can't leverage services built on top of their infrastructure. Such a waste

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet

    Dear lazyweb, if you do assessments for a living, what do you do about keeping records? I tried asking r/netsec, but apparently, doing your job is not r/netsec'y enough.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    16. svi 2019.

    The esteemed talks about the history of the SDL

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    5. svi 2019.

    Senior Principal Consultant , will show us in Melbourne this Nov, how to get practical with the and . Automate security testing or be… made redundant!

    Poništi
  9. proslijedio/la je Tweet

    The 4.0 is done. Thank you to everyone who made it better, reviewed it, or contributed to it. We will be releasing it live on stage tomorrow at . Thanks to and of course

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    10. velj 2019.

    The day we () get engineering teams to do rapid, yet effective threat modeling is when we can claim some success with solving security problems

    Poništi
  11. proslijedio/la je Tweet

    US Federal Government folks. If you are impacted by the shutdown, has many open positions at the moment. I have avoided doing this til now, but no one in (or any other field) should suffer for things they cannot control. Great ppl, great benefits! DM me

    Poništi
  12. proslijedio/la je Tweet
    21. sij 2019.

    Synopsys is looking for a Scrum Master with strong project management and Agile software development methodology skills to support our Security Consulting team.

    Poništi
  13. proslijedio/la je Tweet
    19. pro 2018.

    Here's a short notebook on visualizing traceroutes. Featuring live browser-based tracerouting, with working the SVG.

    Poništi
  14. proslijedio/la je Tweet
    19. pro 2018.

    The BSIMM study continues to be an exceptional place to learn about what folk are doing in their own practices.

    Poništi
  15. proslijedio/la je Tweet
    18. pro 2018.

    One container security strategy is to conduct manual reviews to determine which processes and technologies are appropriate. Want more strategies? Download this eBook to get three more.

    Poništi
  16. proslijedio/la je Tweet
    10. pro 2018.

    Implementing security controls isn’t enough. You need to frequently test them. Equifax implemented many controls & processes that could have prevented or detected their massive breach. But they were all incorrectly or inadequately implemented & no one noticed. Trust but verify.

    Poništi
  17. proslijedio/la je Tweet
    7. pro 2018.

    Taylor Armerding () writes a great article on API security. He says, "...misconfigured or otherwise vulnerable APIs can amount to the digital version of unlocked doors or broken windows..." Read the full story here:

    Poništi
  18. proslijedio/la je Tweet
    27. stu 2018.

    Slide says "same security as KVM VMs", I read: "no security." For example the latest Intel processor vulnerabilities prove that virtualization (on Intel architecture) is not a security feature.

    Poništi
  19. proslijedio/la je Tweet
    3. stu 2018.

    From mainframes to connected cars: How software drives the automotive industry. Read Dr. Gary McGraw's (), latest blog here and watch his presentation:

    Poništi
  20. proslijedio/la je Tweet
    31. lis 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·