Discover and read the best of Twitter Threads about #cybersecurity

Most recents (24)

YOUR LOCAL PUBLIC SCHOOLS IN YOUR STATES HAS CHANGED THE GRADING SYSTEM WHERE YOUR CHILD WHO ORIGINALLY EARNED 100 PERCENT=A. IS NOW BEING DOWNGRADED TO A C LEVEL. THIS IS PROVEN FACT THAT THEY ARE DEMONIZING OUR CHILDREN TO BE LIL COMMIE SOCIALIST BRATS. PREPPIN 4 #Agenda21
This criteria that Public Schools within US is mandated its efforts introduced by the Dems in congress and Senate of Each District of 50 states 2 Mandatory push #Communism Teachings to Children. Targeting #Hatred #Racism #Sexism #LGBTQ & more
thenotebook.org/articles/2017/…
Where the Kids @fedupwarrior4q have new Grading System
A New Kind of Classroom: No Grades, No Failing, No Hurry
all 50 states #RedFlag @realDonaldTrump @BetsyDe

nytimes.com/2017/08/11/nyr…
Read 7 tweets
2/16 Silencing expert voices in the cybersecurity discussion space is a
strategy for weakness not strength, as any Red Team expert would tell
you. #CyberCon #CensorCon
3/16 The @CyberGovAU removed me from the #AISA #CyberCon speakers list
8 days b4 the event. Reason: my talk content was 'incongruent' w/ the
largest cybersec conf in AU. Yet they had not seen my talk content yet.
#CensorCon #cyber #infosec #cybersecurity #informationsecurity
4/16 #CyberCon removed me from the speakers list based on my talk title
alone. I'm not the only speaker removed: @Thomas_Drake1 was also disinvited. Others
told to alter format. #CensorCon #cyber #infosec #cybersecurity #informationsecurity
Read 16 tweets
As part of our @NASSorg #NCSAM IT Director spotlight, we wanted to highlight a few key partners in state #cybersecurity.

The first one up is @CISAgov's @CISAManfra. Follow along with this 5 Q&A thread...
Q1: Can you walk us through a day in the life as the Assistant Director for Cybersecurity for @CISAgov?

A1: The thing about cybersecurity is no 2 days are the same & you need to be ready for anything. My day typically starts with reviewing the news & current intelligence &...
A1 cont'd:...receiving updates from my team on operational priorities. Based on this, we determine appropriate actions. This could mean speaking with gov’t partners to declassify information about urgent threats or meeting with @NASSorg to discuss next steps on election security.
Read 16 tweets
Wenn bei der ÖVP Tatsächlich ein Hacker am Werk war muss das BVT unmittelbar die gesamte Infrastruktur der ÖVP konfiszieren um eine Manipulation der Beweise durch die ÖVP ausschließen zu können. Eine Beweissicherung in diesem Umfang wird wohl mehrere Monate in Anspruch nehmen 1/
Damit ist die ÖVP wenige Wochen vor der Wahl handlungsunfähig. Das betrifft alles, jeden Router, jedes Notebook, jeden Server, jedes Mobiltelefon. Sollte das nicht passieren kann man das als FAKE NEWS abtun. Wenn es passiert ist die ÖVP wenige Wochen vor der Wahl nicht mehr 2/
Handlungsfähig. Nur damit die Tragweite der Aussagen des „unabhängigen“ Cybersecurity Experten und der ÖVP im richtigen Kontext stehen. 3/3
Read 7 tweets
This afternoon, Twitter and Facebook announced they identified and took down a significant disinformation campaign backed by the Chinese government and aimed at undermining the legitimacy of the protests in Hong Kong. Twitter removed 200,000+ accounts.

blog.twitter.com/en_us/topics/c…
"As Twitter is blocked in PRC, many of these accounts accessed Twitter using VPNs. However, some accounts accessed Twitter from specific unblocked IP addresses originating in mainland China."
Twitter followed up this takedown with another major announcement: Twitter will no longer accept advertising from state-controlled (either financially or editorially) news media. Presumably, this should apply to RT, Sputnik, Xinhua, etc.

blog.twitter.com/en_us/topics/c…
Read 5 tweets
A thread about #journalism and #infosec/#cybersecurity.

I hear ALL the time from executives who read about infosec issues in the news and want to know more. Journalists are the most important part of the education and information component of #cybersecurity.
I consider journalists part of #infosec - not outside of it. They serve their purpose like a Firewall admin serves theirs for the larger #cybersecurity space. I've never met a malicious journalist, not saying they're out there but, almost all have good intentions.
Most journalists have a non-technical background. This is changing but it is still the case. Just like many of #infosec who came from a non-traditional background and joined our space we need to be supportive and mentor them.
Read 5 tweets
After my tweet about the Tuwaiq bootcamp, I had some people DM me on how to get started on you own in #cybersecurity as I mentioned.

Here are some general resources.

- FREE COURSES -
cybrary.it
youtube.com
edx.org
udemy.com
-- FREE LABS TO TEST YOUR SKILLS -=
hackthebox.eu
vulnhub.com

If you want to set up a more advanced lab, I created this video guide to great a free lab in the cloud. bit.ly/2XzTwdA
In my opinion you have 2 tracks:
- Fast Track, (aka get rich quick scam), it pays out less in the long run,
- Right way, takes longer by building up the right skills to become an expert.

1) The "Fast Track" is what most people want today, is from zero to cybersecurity expert.
Read 9 tweets
Ahead of @DEFCON, we're highlighting professionals from our Leaders Directory who work in #security & #cybersecurity. And check out our full Leaders Directory for who to know in #tech, #policy, & #politics. #thebridgeleaders thebridgework.com/profiles
@defcon .@CISAManfra, Assistant Director for Cybersecurity @CISAgov says, "Cybersecurity is a significant challenge that requires innovation not just in technical solutions but also in our policies." #thebridgeleaders bit.ly/2YMsoMJ
U.S. Congressman @HurdOnTheHill told us, "I think it’s important for innovators to understand some of the concerns that regulators are going to have further on down the line." #thebridgeleaders bit.ly/2LW4w39
Read 12 tweets
This thread includes all my #infographics so far, they present different terms related to Information Security 🔐

It's an easy way to learn new things 📖 I hope it will be useful to the community. RT appreciated 🌐

Follow me @Guillaume_Lpl for more about #infosec #cybersecurity
What is a Botnet & How ti works?
Follow me @Guillaume_Lpl for more about #infosec #cybersecurity #dataprivacy #ITsecurity #technology
What is a Bug Bounty?
Follow me @Guillaume_Lpl for more about #infosec #cybersecurity #dataprivacy #ITsecurity #technology
Read 29 tweets
Does cybersecurity *suffer* from a rational discourse? YouTube's "Hot Mess" channel discusses a growing need to "respond[] to the science through fear, and that made me a much more committed, much more engaged climate person than I had ever benn before."
*Should* we apply hysteria to #cybersecurity? "That's what many people have found so surprising: that fear can actually make people more engaged... Maybe [psychologists are wrong] at least for some people... Fear is an incredibly powerful motivator."
*Should* we apply hysteria to #cybersecurity? "If the science is alarming, then it's okay to alarm readers with it -- to alarm people with it -- and in fact it's the only, I think, responsible way to respond to that news."
Read 8 tweets
1 of 8: On our journey to a #ZeroTrust #cybersecurity model, @Akamai is helping customers get there with us. How many of these 7 steps are you taking to adapt to a world of #ZeroTrust? (thread follows)
1. Provide users with application-only access, not network access—on a need-to-know basis, based on user identity, device posture, authentication and authorization
2. Eliminate the ever-growing list of holes punched in your firewall that expose your network infrastructure to the public internet. If malicious actors can’t find your network, they can’t attack it.
Read 8 tweets
#CPEC is the backbone of #Pakistan's Grand Strategy. Enemies are keen to foment trouble in #Balochistan to sabotage the project.
A hike in terror attacks has been witnessed in the past months in Balochistan especially in areas in proximity to #Gwadar which is part of #Sabotage.
Killings of #Hazara Shias in Balochistan helps the enemy kill two birds with a stone.
1. It causes trouble in Balochistan,
2. It decreses confidence of Shias in the state of #Pakistan and leads to anger and frustration in Gilgit Baltistan, The Critical province in #CPEC.
Read 9 tweets
2019 is the 50th edition of the #SIPRIYearbook. Join SIPRI as we celebrate the occasion with a 50-day countdown and share the history of the Yearbook over the past 50 years. Watch the introductory video with SIPRI Director @dansmith2020:
The first #SIPRIYearbook was published in 1969 with the aim ‘to produce a factual and balanced account of a controversial subject—the arms race and attempts to stop it’. The rise in world military spending and disarmament efforts, including the #NPT, take central focus.
'In whatever way the nuclear situation is examined, the inescapable feature is what enormous quantities of weapons have been amassed' – Movement towards a first-strike capability by the #US and #USSR, the #SALT talks and European security were a focus of the 1970 #SIPRIYearbook.
Read 52 tweets
"1/3 of our global food supply is pollinated by bees. Simply put, bees keep plants and crops alive."
🐝 If All The Bees In The World Die, Humans Will Not Survive: elitedaily.com/news/world/hum…
Deregulation and control of judiciary appointments: The core tactics at the heart of GOP anti-governance. Here's the latest in banking deregulation and it's corrosive effect on the living standards of us 99%:
Read 29 tweets
For those who want to learn about #infosec 🔐 here is a #thread that includes all my #infographics.
An easy way to learn new things 📖Feel free to share with your community🌐

Follow @Guillaume_Lpl for more things about #CyberSecurity #startup #ITsecurity #security #technologies
Some good tools useful in Infosec

Follow @Guillaume_Lpl for more things about #infosec #cybersecurity
Some good tools useful for OSINT

Follow @Guillaume_Lpl for more things about #infosec #cybersecurity
Read 20 tweets
Thread updated of my infograhics : To make things more convenient and to help beginners in #infosec , I decided to regroup my #infographics with this tweet ! #Cybersecurity #Startups #IoT #ITsecurity #Security #tools
Some good tools useful in Infosec : by @Guillaume_Lpl #infosec #cybersecurity #Infographic
Some good tools for Mobile APP Security Testing : by @Guillaume_Lpl #infosec #cybersecurity #Infographic
Read 13 tweets
.@instagram thread: unique feature. After dealing w my son getting attacked through fake account, we started looking at past likes. Once you start removing past likes, Instagram will block you from being able to access "this feature" Overlooked #privacy #cybersecurity problem
If someone, say a celebrity with a blue check marked got attacked on Instagram, and tried to protect their privacy by deleting past likes on other people's posts, but instead got "temporarily suspended" what would the out cry be? My insta is private, not a blue check. So silence.
But. This seems an inherently poorly thought out UI/UX feature. It is clearly a feature, not a bug. Instagram wrote their algos to prevent people from securing their accounts by not allowing them to unlike past actions.
Seems to me this should be huge thing for privacy lawyers
Read 4 tweets
📍SEIZE THE INITIATIVE AND MAINTAIN MOMENTUM. Present volume one of the #MuellerReport. Focus on election security. Do the open hearings all Mondays, Wednesdays, and Fridays. Hold a weekly press conference. Subpoena witnesses for specific dates at the outset.
📍DO THE OPEN HEARINGS ALL MONDAYS, WEDNESDAYS, AND FRIDAYS. Use witnesses who do respond, expert, specialists, expert panels. Besides three hearings a week hold a weekly press conference on Mondays, to resume highlights from the previous week, and preview the coming week.
Read 15 tweets
Playing with #DigitalFire:

1/7: In martial arts, one of the best moves is to take an attacker's weapon and turn it back on them. In 2016, that's just what #Beijing did – in #cyberspace:
nyti.ms/2Ylm3E3
2/7: After #American operatives used a particular bit of code to attack #Chinese computer systems, Chinese hackers took it, repurposed it, and used it to attack a bunch of US allies.
3/7: The Chinese simply seem to have spotted a #US #cyberintrusion and snatched the code, often developed at huge expense to #American taxpayers.
Read 7 tweets
Threat Hunting In #CyberSecurity : Waiting for an alert can be too dangerous.
Threat hunting means to proactively search for malware or attackers that are hiding in your network — and may have been there for some time.
Most time, the goals of these malware or attackers can be to quietly siphoning off data, patiently listening in for confidential information, or working their way through the network looking for credentials powerful enough to steal key information.
Read 19 tweets
I understand more clearly why HRC was calling for an INDEPENDENT COMMISSION into #TrumpRussiaCollusion
#VoteBlue2020
Davis : The shocking fact that Mueller never would have accused Trump of a crime - The Hill apple.news/A8Mu7XAfOQAaGG…
#IndependentCommission
“Unlike Mueller, the commission could be given the important assignment of educating the public about what happened in 2016 and resolving whatever questions Mueller leaves unaddressed in his still-secret report.”
politico.com/magazine/story…
Read 12 tweets
🔴 #Software is eating the world, and it’s only the beginning

#ArtificialIntelligence #AI #MachineLearning #ML #FutureOfWork #Robots #Technology #Disruption

1/2
🔴 #Software is eating the world, and it’s only the beginning

#ArtificialIntelligence #AI #MachineLearning #ML #FutureOfWork #Robots #Technology #Disruption

2/2
Emerson, Lake & Palmer - From The Beginning (Live)

Read 11 tweets
With the 2020 elections coming on strong already, I think it is important to talk about keeping yourself safe from "hacking".
When you think of hacking, most envision someone using a computer & complex code to break into your computer.
#CyberSecurity
/1
#Hacking can take many forms, many can be done done over the phone or through email messages. These scams are known as #Phishing.
Example: A phone call where someone asks you for information that are common security questions:

Your first car
Mother's maiden name
Birth City
/2
They might pretend to be from your bank, your email or internet service provider, or your mortgage lender. They might pose as someone looking to verify your identity because of "unusual activity". This can come many ways, e.g. via a phone call, text message or email.
/3
Read 13 tweets
I presented a Learning Lab at #RSAC 2019 on "#MentalHealth in #Cybersecurity: Preventing Burnout, Building Resilience" 🛡🧠💪. @RSAConference @MosconeCenter. Here are the slides:
Read 38 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!