Discover and read the best of Twitter Threads about #datasecurity

Most recents (24)

1/7 🚨 #DataBreach Alert 🚨: Personal data of COVID-19 vaccine recipients in India has reportedly been leaked online via a bot on #Telegram. #CyberSecurity #PrivacyMatters Image
2/7 📲 The bot allowed users to input a mobile number and it would respond with personal info connected to the number, including name, gender, DOB, and vaccination center. #InfoSec #DataLeak Image
3/7 📂 The leaked data also includes personal info on several politicians and journalists. This is a serious breach of privacy with significant implications. #DataProtection #PrivacyRights
Read 7 tweets
Best practices for Kubernetes Pods 🧵

#Kubernetes #devops
1/11: 🎯 Single Responsibility Principle 🎯

Assign each Pod a single responsibility, focusing on a specific process or task. By keeping pods lean and focused, you enhance maintainability and avoid unnecessary complexity. #Modularity #ContainerOrchestration
2/11: ⚙️ Resource Allocation ⚙️

Allocate CPU and memory resources to each Pod based on its workload. Keep in mind the QoS Levels:
- Guaranteed (requests == limit)
- Burstable (requests < limit)
- BestEffort (no limit specified)
#ResourceOptimization #Efficiency
Read 12 tweets
$BioFi Everything you wanna node 🧵

Biometric ecosystem leveraging blockchain technology to safeguard personal data. It's a utility token that binds together a secure set of solutions developed by @Finnovant, Inc., and key providers. #BioFi #Blockchain #Biometrics Image
$BioFi addresses concerns about personal data protection and fraud. The $BioFi utility token is available through an online ecosystem that contains secure products, easy to download, activate, and purchase with the $BioFi token. #DataSecurity #Crypto
BioFi has real-life utility functions already launched in the market: Say-Tec API and developer portal, Krptic cryptocurrency wallet, Phēnix X1 Secure Android node mining smartphone, and UniSafeBox password manager. #DeFi #CryptoWallet Image
Read 14 tweets
Identifying projects that will be integral to the future of #Web3 & #Crypto is vital for your portfolio

@OasisProtocol, $ROSE & founder Dawn Song, have partnerships, backers and connections that will blow your mind

Mega Thread below🧵✏️⬇️

Like, RT, Follow and @ tag friends🌹 Image
2) @Meta X @OasisProtocol

For over 2 years they have worked on developing fairness in their #AI

@OasisProtocol is @Meta's chosen technology partner & worth remembering that Meta approached Oasis

I'd be confident in saying this runs deeper than just AI 👀

$ROSE #ChatGPT Image
3) @Google X @OasisProtocol

Bringing the best in data #privacy technology to companies who essentially deal with sensitive information in large volumes

It will encourage & expand support for innovative applications that are computing & memory-intensive

#BigData #AI $ROSE Image
Read 28 tweets
#cybersecurity #pentesting #hacking #DataSecurity

Cybersecurity is essential for protecting our digital lives. From personal devices to enterprise systems, cyber threats are ever-present and evolving. As technology advances, so do the tactics and techniques of cybercriminals.
One of the most important steps in securing our digital lives is to use strong, unique passwords. This means avoiding common words and phrases, & instead using a combination of letters, numbers, and symbols. It's also important to avoid reusing passwords across multiple accounts.
Another key aspect of cybersecurity is keeping software up to date. Software companies regularly release updates that include security patches and bug fixes. By keeping your software up to date, you can protect against known vulnerabilities that cybercriminals may exploit.
Read 9 tweets
🧵 (1/4) Protecting health #DataPrivacy is crucial, especially #PostRoe.

At the Federal level, the UPHOLD Privacy Act would restrict companies from collecting personal health info without consumer consent.…
(2/4) 📲Contact your U.S. Members of Congress to support the UPHOLD Privacy Act. 🔎 Find your legislators here:…
#DataSecurity #DataPrivacy
(3/4) And at the state level, HB3603, Protect Health Data Act, introduced by @RepAnnWilliams, will help safeguard the privacy of every Illinoisans' sensitive health information by implementing new privacy protections. #DataSecurity #DataPrivacy
Read 4 tweets
Grow your cybersecurity skills with this incredible collection of FREE learning resources.

⚡️ Get ready to level up!

Follow & share the 🧵

#infosec #cybersecurity #pentesting #bugbounty
#hacking #blueteam #redteam #technology #DataSecurity #CyberSec #Linux#soc #dfir
1️⃣ Hands-on cyber security training through real-world scenarios.
2️⃣ LiveOverflow YouTube channel
Read 11 tweets
Looking to kickstart your career in cybersecurity?

You can do it all with FREE resources and a clear step-by-step path

Here is How 🧵

#infosec #cybersecurity #pentesting #oscp @tryhackme #hacking #cissp #redteam #technology #DataSecurity #CyberSec #Linux
1️⃣ Level - Introduction to OpenVPN

🅰️ OpenVPN: How to Connect

-OpenVPN - Windows
-OpenVPN - Linux
-OpenVPN - MacOS

The room is free complete it.👇
2️⃣ Introductory Research Walkthrough

Here you will learn

- How to research
- How to search for vulnerabilities

The room is free complete it.👇…
Read 11 tweets
I don't know what it is about Indians and their complete aloofness to #Privacy & #DataSecurity. 5 years back I used to get 1 spam call a day. Today I get 15-20. I have been asked to download @truecaller by 1 in 2 people that I know and could not stop laughing. Most folks (1/n)
(2/n) don't even know how #cookies & #consentmanagement works. Let's clarify a few things about Truecaller.
1) It's a firm registered in #Stockholm started by Nami Zarringhalam and Alan Mamedi. Mamedi is a Kurdish born in a refugee camp in northern Sweden, while Zarringhalam..
(3/n) is of Iranian descent. The apps biggest market in India because they how callous we are with our #PersonalIdentifiableData. Now let's understand how this app works. Even if you DO NOT consent to open up your address book, it can collect your entire personal data from a.....
Read 8 tweets
(1/11) Is #Blockchain an enabler for sustainable future? Fasten your seatbelts as we’re all set to embark on a deep topic voyage. 🧵 Read more at:… Image
(2/11) 💻 #Blockchain is a shared #ledger or repository that computer #subnets may access. It is similar to a #database, but it is secure and #decentralized. #Cryptocurrency systems like #Bitcoin use blockchains to keep a secure and decentralized database of transactions. 🔐
(3/11) 💡Blockchain eliminates a #centralized command structure, allowing #data sharing among parties without needing a centralized system or administrator. It is #secure and #data can't be corrupted or destroyed by anyone with access to the main database. #FinancialTechnology
Read 11 tweets
Thread - My columns on #innovation #creativity #entrepreneurship at the intersection of #culture for The New Indian Express. Just putting them all at one place.
1 - Design to Drive the return of #tourism post pandemic…

#travel #design
Read 15 tweets
1️⃣ NICCS Federal Virtual Training Environment (FedVTE)

2️⃣ SANS Cyber Aces Free Cyber Security Training Course

Read 7 tweets
I want to go into Tech. I need a tech job.

Read this:

With a Tech certificate you can get a good job anywhere in the world.

But Tech Certificates are expensive.

Here are 10 FREE Tech Certifications you can take today. Image
1. Artificial Intelligence For Everyone

AI For Everyone is only for enginers especially those not in tech already.

With this certificate you are prepared to take on entry level jobs in any tech organisation.

It's a FREE on Image
2. IBM Data Science Professional

This Certificate course helps you to pursue a career in data science to develop career-relevant skills and experience.

This course will provide you with the latest job-ready tools and skills. Image
Read 13 tweets
Here are some OSI notes that I took, courtesy of Mike Meyers.

Check him out here:…
Q: What is a model?

A: a simplified process that represents how networks function.

So not this diva. The other type of model.
✅There is the OSI model
✅There is the TCP model

( Image
Read 23 tweets
Live from #GartnerSEC | Data Protection in Microsoft 365 with Andrew Bales, Gartner Principal Analyst.

Follow along for session highlights. Image
Microsoft offers a wide range of #data #security capabilities yet clients struggle to identify which capability is provided with which license and whether Microsoft's native capabilities will meet their organization's requirements. #GartnerSEC
This session will offer guidance on each of the data security feature of Microsoft like Microsoft AIP, DLP and RMS the Microsoft plus approach and best practices to implement it. #GartnerSEC
Read 10 tweets
Let´s talk about @Kiltprotocol $KILT, an open source BC protocol for issuing decentralized identifiers and verifiable credentials who intends to become the identity solution for Web 3.0 Currently running in #Kusama plans to get a Parachain slot in #Polkadot.

$KILT is a decentralized blockchain protocol for issuing self-sovereign, anonymous and verifiable credentials, enabling trust market business models in Web 3. KILT’s mission is to return control over personal data to its owner, restoring privacy to the individual.

Internet users need to register for using services. If those services become successful, they accumulate millions of logins and often collect data on users. This leads to three major problems:

1. The data silos are honeypots for hackers and thus a high security risk.

Read 14 tweets
Here's a thread of 30+ FREE Courses. From AWS Exam Prep, SQL, Cloud, Machine Learning, Analytics, Data Governance and Security courses.

Cloud based roles are the future of work, build your own learning roadmap and start today!🧵
AWS Cloud Practitioner Essentials…
Exam Readiness: AWS Certified Solutions Architect – Professional…

Exam Readiness: AWS Certified DevOps Engineer – Professional…

#DataAnalytics #datascience #data #cloud Image
Read 10 tweets
🔴 LIVE: @rachelsibande joins @CLEARAA1's Talitha Hlaka, @The_DSD's Dez Jason, and @giz_gmbh #FAIRForward's Mark Irura as they discuss #ResponsibleDataUse for #DataGovernance and #MEL in times of unprecedented volumes of #DigitalData and new #DataLaws 👉
Dez Jason kicks things off by sharing @MERLTech's #ResponsibleData in #MonitoringAndEvaluation (#RDiME) #ME and #data life cycles, at every stage of which responsible #DataGovernance is considered key:…
Mark Irura notes the importance of using #data to improve governance but he emphasizes that communities need to know how their data is being used so they can protect their #privacy.

However, choosing not to share your data should NOT prevent you from participating in government!
Read 20 tweets
EXPLAINED: The RBI's #AccountAggregator framework that went live on 2 Sept '21! This new change was heralded as "transformative" to the financial ecosystem.

But does its revolutionary potential stand the test? Follow this thread ⬇️ 1/5 #SaveOurPrivacy…
This framework tries to make #financialdata more accessible between banks or other "Financial Information Providers" and entities requesting that data (like credit platforms) called "Financial Information Users" with the consent of the user.

Here's how it works ⬇️ 2/5
#AccountAggregator supporters say this is a step towards a secure, efficient, & connected financial ecosystem — reducing costs + frauds while prioritising user consent.

But critics say that security issues exist, while the role of RBI in regulating AAs has been questioned. 3/5
Read 7 tweets
What are privacy enhancing technologies (PETs), how are they used, and who uses them? Fintech Policy Advisor Kaitlin Asrow shares her thoughts about these emerging technologies and why they matter:

#Fintech #DataProtection #DataSecurity #Cybersecurity
"It's important to note that these systems, processes, and techniques do not ensure privacy
or compliance on their own. PETs are a tool that can be used in tandem with governance and operation systems."

#Fintech #DataProtection #DataSecurity #Cybersecurity
“Examples of PETs used directly by people include privacy-protected browsers or even privacy screen shields.”

#Fintech #DataProtection #DataSecurity #Cybersecurity
Read 6 tweets
The #POPI Deadline is looming, is your startup or company compliant?

Here's a quick thread on how you can comply and empower yourself.

#privacy #privacypolicy
You can start by examining the status of your startup or company by completing this POPI COMPLIANCE CHECKLIST
We carefully drafted these policies for internal implementation in line with POPI Compliance for you.…
Read 12 tweets
Daily Bookmarks to GAVNet 05/10/2021…
Public Citizen Report Finds That Corporate Prosecutions Plunged to a 25-Year Low Final Year of Trump Administration…

#CorporateProsecution #CorporateLeniency #CorporateImpunity
A New Study Reveals that Not Prosecuting People for Nonviolent Misdemeanors May Actually Reduce Crime…

#prosecution #misdemeanors #consequences #CrimeRate
Read 10 tweets
Your @WhatsApp groups may not be as secure as you think they are. WhatsApp Group Chat Invite Links, User Profiles Made Public Again on @Google Again.
Story -…
#Infosec #Privacy #Whatsapp #infosecurity #CyberSecurity #GDPR #DataSecurity #dataprotection ImageImage
Whatsapp also allows users to generate rich preview links of group chat invites that eventually may allow search engine crawlers to identify the links and then index them for future searches. This issue was apparently fixed by Whatsapp last year after becoming public.
Whatsapp Statement on this -… Image
Read 5 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!