Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @vicne
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @vicne
-
ǝɔuıʌ proslijedio/la je Tweet
We hear about attacks at the same time, but learn to defend alone. How can we change this so every defender can be as good as the best defender? In this post, I talk about an open, vendor neutral, community based approach to accelerate infosec learning.https://medium.com/@johnlatwc/the-githubification-of-infosec-afbdbfaad1d1 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
Ever wondered what lies beneath that cool looking chip on your bank card? What does it do? Why is it there? Well here's a little pointless thread that delves into the magic using my
@monzo card as an examplepic.twitter.com/DM1MUNtwZ0
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
Most Interesting from
#ThreatHunting &#IncidentResponse Summit & Training 2019 (based on my opinion:)
#Jupyter Notebooks & Pre-Recorded Data Sets
https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1569948711.pdf …
@Cyb3rWard0g &@Cyb3rPandaH
Awesome work!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
The Stress and Joy of Security Jobs. A thread. A few months ago there was this whole thing about the stress of security roles, CISOs self-medicating, and a whole range of burn-out talk. Ok, yes, security is a tough job. A very tough job. 1/14
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
Cybersecurity is not the only technology risk. A thread (hopefully obvious). In fact, when you total up actual losses it is likely not even the biggest risk. Although I think it is the risk which is increasing the most and has the highest potential existential impact. 1/15
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
So when I wrote Microsoft's 1st formal vulnerability coordination policy, I changed "responsible" to "coordinated". I also successfully got it removed from the ISO standard in progress, so nobody would think this moralistic labeling was a good practice.https://blogs.technet.microsoft.com/ecostrat/2010/07/22/coordinated-vulnerability-disclosure-bringing-balance-to-the-force/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
"How can management tell you're doing a good job Mr Hunt guy" "99.9% of the red team's campaigns were caught using custom rules made by the hunt team using log telemetry and not ids/ips systems" "Yeah but other than that"
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
NEW VIDEO: You all asked me to detailed how I built my "book as code" project. I cover all the components here at a medium level of depth in about 30 minutes. 100% ad-free. Please share if you enjoy it!https://www.youtube.com/watch?v=6YGmNtsmz2k …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
In what's sure to be an unpopular sentiment, my suggestion at security conferences is to have less "talks" & more training on how to be effective at doing the basics in information security. Methinks there's a huge need for training in the community due to diff levels of exp.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
Just as we talk about the need for secure products, not just security products, we also have to shift our perspective on people and say: we need the people we already have to be more productive - and we need more security minded people not just more security people. So.... 4/15
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
If you are interested in seeing a kill chain/technique matrix built out for O365 attacks, give this tweet a like and let me know!pic.twitter.com/6pas4RwHjk
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
In case you missed it last night, I changed the minimum price of my virtual machine lab PDF to free. Go get you a copy. Tell your friends.http://leanpub.com/avatar
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
Excited to share my first blog post! It compares personal stories to covert infrastructure setup, and this post is the first in a series that will cover similarities between red team operations and social engineering. Let me know what you think :)https://posts.specterops.io/abusing-bias-part-one-infrastructure-e0ea74652b6e …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
Fresh on the heels of my successful GIAC Critical Controls Certification, may I take this opportunity to describe what an absolute fanboy I am for the
@CISecurity Critical Security Controls. Now is the time to grab v7 to audit & implement. https://www.cisecurity.org/blog/cis-controls-version-7-whats-old-whats-new/ … Use them &#win.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
100% free and production-grade Ansible playbooks available here. Most are deployed at my current customer for more than a year. http://njrusmc.net/code/code.html For those already using them, let me know what business case they are helping you solve!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
Singing the Blues: Taking Down an Insider Threat "I had all of the advantages. I was already inside the network. No one suspected me. But they found my hack, kicked me off the network... ...and physically hunted me down."pic.twitter.com/468Q6C4KR5
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je Tweet
I'm running my Python training course again in January, which was a blast on Friday. Sign up now before it fills up. 500 people registered for the session last week, and there are about 120 open seats left.https://www.safaribooksonline.com/live-training/courses/learning-python-3-by-example/0636920224969/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
ǝɔuıʌ proslijedio/la je Tweet
Regarding Programming and it’s necessity in InfoSec: Is programming a core requirement of entry to get into every aspect of InfoSec? No. Do you need to learn, at some point, programming in order to advance in many areas of InfoSec? Yes, in some areas (but not all).
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ǝɔuıʌ proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.