Sumanth Naropanth

@snaropanth

Security professional, photography and travel enthusiast. CEO of Deep Armor - an information security consulting firm. Alumnus of Columbia University (SEAS)

Bangalore, India
Vrijeme pridruživanja: travanj 2009.

Tweetovi

Blokirali ste korisnika/cu @snaropanth

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @snaropanth

  1. proslijedio/la je Tweet
    31. sij

    The 3rd one on the list is from us! Interested in a multi-pronged approach to learning IoT security? We cover Bluetooth/BLE, Zigbee-style networks, AWS IoT Core and more. Here’s a quick preview of what you’ll learn in our program: .

    Poništi
  2. 28. sij

    Team is excited to be teaching at Troopers 2020 in March! Give us a shout if you’d like to know more before signing up

    Poništi
  3. 13. sij

    This is really cool. In my own experience, I’ve realized that the people in the audience want to talk to you (obviously), but are hesitant initially when they do not know you. Breaking the ice this way is a great idea

    Poništi
  4. proslijedio/la je Tweet
    5. sij

    I have 0 CVEs. I've found many many bugs, but I don't need a CVE to prove anything. If you seemingly think a CVE makes you l337, you need to rethink.

    Poništi
  5. proslijedio/la je Tweet
    23. pro 2019.

    Our next story is on a popular topic among cloud software professionals, yet one that is complex and often misunderstood. Read our piece on 'Introduction to Container Security' at: More content on container security tools & benchmarks in the coming weeks

    Poništi
  6. proslijedio/la je Tweet

    As I’ve been saying, cyber-insurance WILL influence every role and aspect of InfoSec. Get ahead of it. "Cyber insurance carriers are assuming greater control over how enterprises conduct incident response, which has caused angst and frustration among some security vendors."

    Poništi
  7. proslijedio/la je Tweet
    12. pro 2019.

    Over and over again, kids tracking watching have egregiously bad security. Also over and over again, manufacturers say “we take security seriously”

    Poništi
  8. proslijedio/la je Tweet
    6. pro 2019.

    The breadth of AWS is just ridiculous—take any software company, and it's likely AWS has a direct competitor. As a standalone company, your product better be 5x better. Or else the AWS default product wins.

    Poništi
  9. proslijedio/la je Tweet
    2. pro 2019.

    2019 Panel:IoT Security policy tunnel vision of FreshThinking? Arnab Chattopadhay, AssocDir, IBM, Giri Govindaraju CISO, Cisco APAC, Amit Rao VP, Trusted Objects and Sumant Naropanth, CEO, Deep Armour

    Poništi
  10. proslijedio/la je Tweet
    27. stu 2019.

    Me: “How did our port scan truncate your database table?” Him: “The application expects incoming data on that port.” Me: 🤨 Turned out that TRUNCATE happens on a TCP connect. True story. Expect the unexpected.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    27. stu 2019.

    The CapitalOne hack that occurred earlier this year was an interesting case from a technical perspective. Read our story on how exactly it happened, and the options available to prevent such attacks in the future:

    Poništi
  12. 26. stu 2019.

    The IoTSF annual conference kicks off. Excited to be presenting our work this afternoon on practical exploitation of IoT wireless protocols

    Poništi
  13. 18. stu 2019.

    We've been wanting to do this for a long time at . Share some cool stories about our research, tools, and also frustrations when we hit a wall while working on some interesting problems. Watch our Twitter/LinkedIn for our posts.

    Poništi
  14. proslijedio/la je Tweet
    Odgovor korisniku/ci
    Poništi
  15. proslijedio/la je Tweet
    25. lis 2019.

    It’s the season of lights and sweets. Happy Diwali, from team Deep Armor!

    Poništi
  16. proslijedio/la je Tweet
    16. lis 2019.

    Colleagues had a car broken into and laptops stolen in downtown Mountain View last night while we were at dinner. We wondered how they knew to break into the hatchback when it is not see- through. They turn on bluetooth scanners and follow the beacon to find electronics.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet

    Ken Thompson's Unix password: Somewhere around 2014 I found an /etc/passwd file in some dumps of the BSD 3 source tree, containing passwords of all the old timers such as Dennis Ritchie, Ken Thompson, Brian W. Kernighan, Steve Bourne and Bill Joy.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet

    Dear InfoSec, as predicted… the shift is already starting to happen. The purchase of various product & services will be increasingly economically dictated by cyber-insurance carriers. Whether we like it, or not.

    Prikaži ovu nit
    Poništi
  19. 18. ruj 2019.

    Fork bomb on the CS department cluster, the very first week at Columbia U. The sysadmin thought it was intentional (it wasn't). Still remember how terrified I was when she summoned me.

    Poništi
  20. proslijedio/la je Tweet

    okay, thats enough for today. I found out you can control a lake over the internet

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·