Discover and read the best of Twitter Threads about #Security

Most recents (24)

(1. Touched down in #Dublin🇮🇪earlier today. Good to be in #Ireland for a few days. Been following some commentary on the Consultative Forum closely,disappointed at some of the false binaries we are imposing on ourselves: pro-#NATO/anti-NATO or pro-#neutrality/anti-neutrality.
(2.What we need is better knowledge&depth as well as workable #security options that public want to unify behind & sooner rather than later. Inducing more polarization only weakens #Ireland's national #security further--diametric opposite to what we are looking for.
(3. If politicians, academics&policy experts fail to help in developing options along these lines&if some chose to side-track themselves with bitter disputes or false binaries then I think this will be a big opportunity missed to improve matters & history will be a harsh judge.
Read 5 tweets
🔑 More passkeys for everyone!

Descope now helps you add passkey authentication to your app without changing your primary identity provider or user store.

Amazon Cognito and Auth0 customers can now add passkeys to existing logins by using our service as a federated IdP.

🧵👇 Drag and drop passkey authe...
🗣️@slavikm: “We are huge believers in the potential of passkeys. They are unphishable and make the process easier for end users. Our goal with these product enhancements is to reduce friction for any developers looking to add passkeys to their apps.”

Amazon Cognito customer?

✅ Check out our dev blog on how to add #passkeys to your existing user pools:…

✅ If you're a visual learner, this video covers the basics:

#authentication #identity #security #developers #cognito #amazon
Read 4 tweets
Right before the French Days of #Agriculture 2023, let’s dive in the One Planet Fellowship’s #Science Week!

💚 Follow me for 2 days amongst the inspirational programme’s Laureates!

#OnePlanetFellowship #JNAgri #research #climate Image
🚀 First, a global overview of the #OPF programme - @FondationBNPP has been supporting for 5 years! - by François Pierrot, Acting Director & Ly Ann Kauv Project Officer, from @Agrofondation, Olivier Dangles (@ird_fr) & Michèle Mbo’o-Tchouawou, Deputy Director @AWARDFellowship ImageImageImageImage
🌟 Key notions, challenges and issues reminded:
- New generation of researchers
- Gender equality in science & agriculture
- EU 🔁 Africa
- From local to global
- Capacity building
- Network
- Collaboration (North-South, AND South-South!) Image
Read 31 tweets

A beginner's guide to securities in the world of #crypto! 🚀

🔒 What is a #security?

In simple terms, a security is a type of financial asset or investment instrument.

It represents something of value that you can trade, like stocks or bonds. 📊💰
🔒 How is a #crypto determined to be a security?

Well, it depends on its characteristics and how it's offered to investors.

In the US, the Securities and Exchange Commission (SEC) uses the "Howey Test" to evaluate this. 🧪
🔒 The #Howey Test asks:

Does the investment involve putting money into a common enterprise with the expectation of profits primarily from the efforts of others?

If the answer is yes, it's likely considered a #security. 📝✅
Read 10 tweets
AWS IAM Explained with Examples!

A Thread 👇 PS: https://www.howtogeek.c...
1/6 🔒 What is AWS IAM? 🔒

AWS Identity and Access Management (IAM) is a service that enables you to securely control access to your AWS resources. IAM allows you to manage users, roles, and policies to define and enforce permissions for accessing your AWS services.
2/6 👥 Users
In IAM, users represent individual people or entities dat need to interact with ur AWS resources. Users r assigned unique creds, such as access keys, to authenticate themselves when accessing AWS services.

For Eg: @johndoe is a user with access to EC2 instances. Image
Read 17 tweets
10 ways to use awk for hackers! 🚀 🧵👇 Image
1️⃣ Extracting Specific Columns from a CSV File

Quickly extract email addresses and phone numbers from a huge contact list.

#DataExtraction #EthicalHacking Image
2️⃣ Filtering Lines Based on a Pattern

Filter out sensitive information like passwords from log files.

#LogAnalysis #Security Image
Read 11 tweets
1/🚀🎉 BRC-30 the TLDR 🔥

A new protocol called BRC-30 has been proposed!🔥 It's an extension of the BRC-20 token standard that adds staking functionality to the Bitcoin blockchain. It's like BRC-20, but with superpowers!💪🔮💥 Here's a quick summary! #BRC30
2/💡With BRC-30, you can stake your BRC-20 tokens or Bitcoin and receive BRC-30 tokens as a reward. 🎁 It’s like putting your digital assets to work and getting paid for it!💼🚀 #BRC30 #Bitcoin #Staking
3/🎯The motive behind BRC-30 is simple - we want token holders to do more with their tokens and be rewarded for it! 🏆 It’s all about fostering greater participation and creating a stronger bond within the ecosystem. 🤝🌐 #BRC30 #Bitcoin Image
Read 8 tweets
Well @Justin_Bons that is why $DAG exists 😉

Let's explore together how @Conste11ation validates data at the edge and why Metagraphs are the perfect solution for integrating AI with Blockchain
#edgecomputing #EdgeData #BigData
Ready set go 🚀
Down the #HGTP rabbit hole 👇 Image
AI is only as good as its data. With the rise of IoT devices and real-time data processing, the need for efficient and scalable edge computing solutions is paramount. Enter HGTP and Metagraphs by @Conste11ation $DAG #AI #EdgeComputing
HGTP, built on a DAG architecture, is designed to handle complex data types and large volumes of transactions. Its concurrent, parallel, and asynchronous processing capabilities make it ideal for handling vast amounts of data generated by edge devices. #HGTP #DAG
Read 18 tweets
"🔒✨ Revoke Token Approval with Trust Wallet! Protect your assets and regain control over your tokens. Learn how to revoke token approvals step-by-step with our comprehensive guide. Don't leave your tokens vulnerable. Stay secure! #TrustWallet #TokenSecurity #RevokingTokens 🔐 Image
@TrustWallet Step 1: 🚀 Launch Trust Wallet
Open the Trust Wallet application on your mobile device. Make sure you have the latest version of Trust Wallet installed. If not, update the app from the respective app store. #TrustWallet #CryptoWallet Image
Step 2: 🔍 Tap on the "Browser" tab located at the bottom of the Trust Wallet interface. This will open the DApps browser within the Trust Wallet app. #DApps #Browser
Read 13 tweets
🔥#Irlande - Une jeune mère de #Galway dit qu'elle craint pour sa propre sécurité et celle de ses #enfants à cause des plans du Département de l'égalité de jeter 300 demandeurs d'asile célibataires (via Infos & Partage)
#Immigration @YvesPDB #migrants #Irland #Security
dans un immeuble de bureaux du #BallybritBusinessPark.
Faisant référence au meurtre d'#AshlingMurphy l'année dernière, elle a déclaré à un grand groupe d'habitants qui se sont rassemblés devant l'immeuble de bureaux que "ce genre de choses va continuer à se produire à moins que nous ne disions quelque chose maintenant".
Read 6 tweets
1/ Unleashing the Power of Assets Monetization: How @PhotonsHedge Utilizes Games and Blockchain to Drive Investment Potential. 💰🎮

In an era where gaming and blockchain converge, we strive to ensure our investors capitalize on this lucrative innovation.

🧵A Thread
2/ Our investors are introduced to notable gaming projects like @AxieInfinity, @decentraland, and @TheSandboxGame on the blockchain network that enables players to own and monetize their in-game assets, recorded on the blockchain which becomes valuable digital properties.💎💰
@AxieInfinity @decentraland @TheSandboxGame 3/ Unlike traditional games, building games on decentralized systems, such as a blockchain, gives our investors a much more rewarding experience and @PhotoHedge’s in-depth knowledge of GameFI validates its readiness to support truly decentralized gaming. 💻⛓️
Read 11 tweets
#Ukraine Banning Pro-russian TV Stations and Political Parties - #Disinformation #Overview Image

“This is a recurring #disinformation narrative by pro-#Kremlin media about the West’s purported attempts to interfere in #Ukrainian politics and set the #political establishment there against #Russia.
In reality, neither pro-#Kremlin parties nor #politicians nor #media are #persecuted in #Ukraine as long as they obey the #law.
Read 25 tweets
1/14 🚀 We've put together an in-depth series on APIs, covering everything from fundamentals to AI APIs. Join us on this journey! #APIs #WebDevelopment #Coding
2/14 📚 Starting with API fundamentals, we dive into the basics that every developer should know. Get the solid foundation you need!… #APIFundamentals #BackToBasics #LearnToCode
3/14 🌐 HTTP and RESTful APIs are key to modern web services. Learn how these technologies power the web.… #RESTfulAPIs #HTTP #WebServices
Read 16 tweets
[1/🧵] You've heard of @XummWallet but aren't sure if you can #trust its #security?

You'll learn about @cossacklabs' most recent security assessment and why the #XUMM #wallet strives to maintain the highest security standards.

Follow along in this "all-in-one security 🧵" 👇 Source:
[2/24] — Outline —
🔸 Basic Introduction
🔸 Hot #Wallet Fundamentals
🔸 #XUMM Wallet Security
🔸 #Security Audit (18.05.2023)
🔸 XUMM @Tangem Cards
🔸 #Tangem Card Facts Source: https://www.gagan.p...
[3/24] — Basic Introduction —

After hearing the news of #Ledger willingly integrating a 🔑-extraction mechanism into their FW if opted-in, I decided it was time to review #XUMM + @Tangem

This 🧵 is not sponsored in any way, & all of my praise comes from the bottom of my ❤️ Source: https://www.ledger....
Read 25 tweets
🧵#DidYouKnow? You can now purchase #HyperCycle #MasterNode through #NFTs on #BTC, #ETH, #MATIC & #ADA #CardanoNFT! The NFT is simply a pointer to the node ownership. As a #node owner, you can transfer or split ownership up to 512 nodes.

Check it out at Image
2/8 #Crypto incentives? Yes, please! As a #node owner, you can earn rewards for providing #AI computational services. It's a fantastic way to utilize your #digitalassets, and you play a key role in the maintenance and security of the #blockchain. #CryptoRewards #Security Image
3/8 You become a vital part of the infrastructure. #Node owners directly contribute to the health, speed, and resilience of the #HyperCycle network. This role isn't just technically significant; it's also personally fulfilling! #NetworkHealth #BlockchainTechnology Image
Read 8 tweets
🧵Thread: Unlocking the Power of MPC
for Enhanced Security! 🔐

.@Ledger .@ZenGo #blockchain #Security
Greetings, crypto enthusiasts!

Today, we explore the revolutionary world of
Multi-Party Computation (MPC) and why it
might just surpass traditional seed phrases
in securing your digital assets.

Get ready for an enlightening journey! 🌟
1️⃣ Intro: Welcome to the era of next-level
security! MPC is a game-changer in the
crypto realm.

Let's dive into how it surpasses traditional
seed phrases and fortifies the protection
of your precious assets.💪🔒
Read 10 tweets
I'm excited to share these 10 FREE cybersecurity
courses from ISC(2) with you!

I've learned a lot from them and I think you will too.

Follow the thread to get started 👇👇

#cybersecurity #security #informationsecurity #freecourses #learnmore #Cloud Image
1⃣ Incident Detection & Response…
2⃣ Securing Software, Data and End Points…
Read 12 tweets
What is it for DevOps in 2023 ❓

In 2023 (And it will probably remain significant shortly) that DevOps will continue to be a critical focus for organizations.
Here are some areas of importance in the DevOps landscape ⬇️

#DevOps #CloudNative #Security #AI Image
Cloud-native DevOps ☁️

As cloud adoption continues to grow, organizations are increasingly adopting cloud-native technologies and practices. DevOps will likely emphasize integrating cloud services, infrastructure automation, and containerization into the deployment processes.
Security in DevOps 🔒

With the rising number of cyber threats, security will remain a top concern in DevOps. Organizations will focus on implementing security measures and adopting DevSecOps practices to ensure the continuous delivery of secure software.
Read 7 tweets
🥷Security in #Azure | Mega thread 🥷

1. What is Azure?…

2. #AWS #Security Maturity Roadmap…

3. #Hunting Azure Blobs Exposes Millions of Sensitive Files…
4. Tutorial: Discover and manage shadow IT in your network…

5. Use tags to organize your Azure resources and management hierarchy…

6. Resource naming and tagging decision guide…
7. Assign policy definitions for tag compliance…

8. What are Azure management groups?…

9. Use cost alerts to monitor usage and spending…
Read 13 tweets
#Zelenskyy’s shirt featured #Ukraine #military emblem, not hate symbol”

#russian #disinformation Image
“AP’S ASSESSMENT: False. #Zelenskyy wore a #military T-shirt that featured the official #emblem for the #Ukraine #Armed #Forces. In its center, the emblem includes Ukraine’s official coat of arms.
The image on his shirt did not match the #Iron #Cross or any hateful symbol, according to historians and #extremism experts.”
Read 8 tweets
📚🌐#Web3 is revolutionizing the #education sector with its decentralized approach and groundbreaking technology!
🏫In this thread, we explore the potential impact of Web3 on the educational system. Image
1/7 🏫 Web3 and education in #Ed3 bring learn-to-earn models and personalized learning experiences, offering students more control and ownership over their data and learning paths.📚
2/7💻Web3 provides enhanced accessibility, improved traditional education, personalized education, and increased #transparency in the edu sector. 📢
Read 8 tweets
Read 13 tweets
I went to #Islamabad #PIMS a day earlier and asked for rabies #vaccine, #rabies is a deadly virus and there's 100% chance a person will die if vaccination isn't administered on time. However, the person in the picture, at #PIMS's pharmacy,
@IslamabadPims @nhsrcofficial Image
told me very arrogantly to buy and administer the vaccine somewhere else. When I asked for his name, he hesitated, but when I insisted, he said I'm the director and there is no one you can go to and complain.
I requested him that I can afford the vaccine but what about those who may not afford the same, and that I am a citizen of #Pakistan and I am aware of my rights, thus let me lodge a formal complaint to the relevant department so the problem may soon be resolved.
Read 22 tweets
@Europarl_EN #Merkel and #Hollande admit the west didn't want to achieve #peace in the #Donbas through the #MinskAgreements (2014 and 2015).
- They wanted to give the coup regime in #Kiev TIME to #prepare for #war - to help #CRUSH #ETHNIC #Russians Dec 28, 2022
@Europarl_EN cc: @ TaranQ
German '#Merkel' (#Hitler's daughter) in an interview with the German newspaper #DieZeit:
- "The 2014 #MinskAgreement was an attempt to give Ukraine #time. They used that time to get stronger, which you can see today.
Read 16 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!