Roberto Quiñones

@RobertoQuinones

PKI, Code Signing, Key Management, Secrets Management @ Intel Corp...

Arizona, USA
Vrijeme pridruživanja: listopad 2009.

Tweetovi

Blokirali ste korisnika/cu @RobertoQuinones

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @RobertoQuinones

  1. proslijedio/la je Tweet
    3. velj

    We've determined that an authentication certificate has expired causing, users to have issues using the service. We're developing a fix to apply a new certificate to the service which will remediate impact. Further updates can be found under TM202916 in the admin center.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet

    When you share your data without the right protections, it can be exposed to cyber threats and vulnerabilities. Discover how is uniquely positioned to help customers protect their data and drive with tools like .

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    Join Intel at RSA Conference 2020 in San Francisco to learn firsthand how, together with partners and customers, Intel is building the trusted foundation for computing in a data-centric world:

    Poništi
  4. 30. sij
    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet

    High school science teachers, share this opportunity with your students! We’re accepting applications for the 2020 Summer High School Intern Program through Feb. 1:

    Poništi
  6. 30. sij

    Professor shares thoughts on quantum computing and data processing at Securtiy Summit

    Prikaži ovu nit
    Poništi
  7. 30. sij

    Digicert CTO Dan talks about innovation in platforms and culture to meet certificate management demands

    Poništi
  8. 29. sij

    Looking forward to learning from all the folks speaking and attending ’s Security Summit!

    Poništi
  9. proslijedio/la je Tweet
    27. sij
    Poništi
  10. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  11. 24. sij

    It's 10 PM. Do you know where your passwords are?

    Poništi
  12. 24. sij

    Vote by smartphone... What could go wrong

    Poništi
  13. proslijedio/la je Tweet
    20. sij
    Poništi
  14. proslijedio/la je Tweet
    16. sij

    Google Trust Services has several open roles for Security Engineer / Site Reliability Types in NYC and Zurich. If your impacted by the Mozilla layoffs and those locals and type of work are interesting reach out. DMs open.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    14. sij

    This you are strongly encouraged to implement the recently released CVE-2020-0601 patch immediately.

    Poništi
  16. proslijedio/la je Tweet
    14. sij

    NEW: along with several other cryptographers speculate on how CVE-2020-0601 works at a technical level:

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    14. sij
    Poništi
  18. Feliz Nochebuena! 🎄🥂🎁 Jugando “Millennial Lotería” con la familia

    Poništi
  19. proslijedio/la je Tweet
    22. pro 2019.

    Chinese hacker group caught bypassing 2FA * Report details new APT20 activity * Attacks discovered in 10 countries * Primary victims include govt entities and MSPs

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    Self-signed X.509 PKI certificates (SSC) that were generated on devices that run affected Cisco IOS® or Cisco IOS XE software releases expire on 2020-01-01 00:00:00 UTC. New self-signed certificates cannot be created on affected devices after 2020-01-01 00:00:00 UTC.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·