In the Last 7 days there's been 15 influencers like snlyngaas and RSAsecurity, discussing topics such as #cybersecurity, #passwordlessand #Abertay25.



Trends


Top hashtags

Top influencers

snlyngaas
RSAsecurity
CFR_org
CyrilCoste
GlasswingVC
ISC2
PogoWasRight
SCMagazine
TAKellermann

Top sources

cyberscoop.com
blog.claroty.com
corporate.delltechnologies.com
internetpolicy.mit.edu
magazine.cointelegraph.com
slate.com
us.norton.com
venturebeat.com
abertay.ac.uk

News

DHS’s cyber wing responds to ransomware attack on pipeline operator

On Feb 18, 2020
@TAKellermann shared
RT @snlyngaas: DHS’s cyber wing responds to ransomware attack on pipeline operator https://t.co/aEi3eBRYXH
Open

DHS responded to a ransomware attack on a natural gas facility that led the organization to shut down its operations for two days, the agency said Tuesday.

www.cyberscoop.com
On Feb 18, 2020
@TAKellermann shared
RT @snlyngaas: DHS’s cyber wing responds to ransomware attack on pipeline operator https://t.co/aEi3eBRYXH
Open

DHS’s cyber wing responds to ransomware attack on pipeline operator

DHS responded to a ransomware attack on a natural gas facility that led the organization to shut down its operations for two days, the agency said Tuesday.


On Feb 18, 2020
@s_crawford shared
[email protected] goes to private equity consortium led by Symphony Technology Group for $2bn https://t.co/nu92TKVIXc
Open

Symphony Technology Group Enters Definitive Agreement with Dell Technologies to Acquire RSA

Read recent press releases and blog posts about events and activities at Dell Technologies.

On Feb 13, 2020
@dabeard shared
Warning: The internet voting app used in West Virginia has security vulnerabilities that would allow someone to change votes, MIT researchers found. https://t.co/a6LViQNZT7 h/t @KimZetter cc: @publicintegrity @electionland https://t.co/W6WXTJeTRU
Open

Click here to read the article

∗With appreciation to Barbara Simon [39] †EECS PhD Candidate, CSAIL, Internet Policy Research Initiative ‡EECS PhD Candidate, CSAIL, Computer Assisted Programming Group §Research Scientist, ...

On Feb 13, 2020
@ISC2 shared
As companies battle a growing array of external and internal threats, artificial intelligence (AI), machine learning (ML), and automation are playing increasingly large roles in plugging that workforce gap. https://t.co/bxORT5qGPu #ISC2 #cybersecurity via @VentureBeat @psawers
Open

AI, automation, and the cybersecurity skills gap

VentureBeat checked in with key people from the cybersecurity industry to see how they're addressing the talent shortage and what role AI is playing.

On Feb 19, 2020
@mediaphyter shared
RT @Claroty: The Claroty research team has discovered a new vulnerability in the #Siemens Digsi 4 protocol, the same protocol exploited by the Industroyer/Crashoverride malware in 2016. Read more about the discovery as well as Siemens' advisory and mitigations: https://t.co/iC0zrRr7QQ
Open

Claroty discovers new vulnerability related to Industroyer malware

Claroty has discovered a vulnerability (CVE-2019-19279) in the Siemens Digsi 4 protocol.

On Feb 15, 2020
@RSAsecurity shared
Are you reading the fine print on your #cyberinsurance policy? While it is an another cyber #RiskManagement tool, RSA CTO Dr. @Zulfikar_Ramzan warns it can be a false sense of security if organizations don’t closely examine the terms! (via @InformationAge):https://t.co/M0jtY3DrVm
Open

How to choose a cyber insurance policy

Cyber insurance is becoming increasingly vital for protection, so what's to be considered when choosing an insurance policy?

On Feb 14, 2020
@snlyngaas shared
Energy Department shakes up cyber leadership with appointment of ex-NSA official https://t.co/mbNJZdQ1Xz
Open

Energy Department shakes up cyber leadership with appointment of ex-NSA official

Department of Energy officials have tapped a veteran of the NSA to lead an office that helps protect U.S. industry from hacking threats.

On Feb 19, 2020
@snlyngaas shared
Hackable firmware lurks inside Dell, HP and Lenovo computers amid supply chain security efforts https://t.co/OhvfUdZHrp
Open

Hackable firmware lurks inside Dell, HP and Lenovo computers amid supply chain security efforts

A stealthy hacking technique that could make it possible for attackers to access different components inside PCs made by the likes of Dell, HP and Lenovo still exists, five years after ...

On Feb 15, 2020
@CyrilCoste shared
RT @antgrasso: The World Economic Forum has developed a Cybersecurity Due Diligence Assessment Framework consisting of Organizational Security and Product Security. Link >> https://t.co/csGq0u2E8t @wef via @antgrasso #CyberSecurity #dataprotection #DigitalTransformation https://t.co/XMWeKQLK3Z
Open

Why cybersecurity should be standard due diligence for investors

If investors demand better security practice in both their portfolio and target companies, they can play a part in securing our digital futures.

On Feb 13, 2020
@snlyngaas shared
RT @konklone: The researchers here reported these issues to @CISAgov, rather than @Voatz directly, out of concern for potential retaliation. Their fear is well justified. In October, Voatz reported a student at U of Michigan to authorities for analyzing their app: 2/ https://t.co/nUpzUdgYye
Open

Safe Harbor, or Thrown to the Sharks by Voatz?

Bug bounty hunters help voting apps offer a more secure system. But the FBI has investigated a student researcher searching for bugs in the Voatz app. Why?

Browse topics

Get updates live! Follow us on

Choose your newsletters

On Feb 15, 2020
@RSAsecurity shared
A truly #passwordless world... Is it possible? RSA's @JimDucharme39 weighs in on the potential for one in @CSOonline. Check out the article here: https://t.co/x5p3X4lAwH
Open

The 25 worst passwords of 2019, and 8 tips for improving password security

Blacklist these 25 passwords now and use these tips to improve enterprise password security.

On Feb 16, 2020
@PogoWasRight shared
RT @avishai_efrat: 3 more data leaks discovered recently in the medical world, in a new research I did at Wizcase: https://t.co/0SCxTc7a8R #medicalrecords #cybersecurity #dataleak
Open

Data Leaks in the Medical Industry: The Problem Continues

After our previous report on database leaks from medical websites around the world, WizCase’s security team diligently continued their research. They discovered 3 additional unsecured ...

On Feb 14, 2020
@GlasswingVC shared
RT @AiThority: @Verusen_AI Named a Top 40 Innovative Technology Company https://t.co/ksr0VtHVaY #machinelearning #blockchain #artificialintelligence #AINews #AiThority
Open

Verusen Named a Top 40 Innovative Technology Company

Verusen, an innovator in materials inventory and data management technology, announced that it has been named a Top 40 Innovative Technology

On Feb 18, 2020
@snlyngaas shared
Iran-linked hackers use VPN exploits in far-flung spying campaign https://t.co/vhHKH1vODL
Open

Iran-linked hackers use VPN exploits in far-flung spying campaign

Iranian hackers are using unpatched vulnerabilities in VPNs to spy on companies in the aviation, oil and gas, and telecommunications sectors.

On Feb 18, 2020
@SCMagazine shared
Cyberinsurance: The value from an incident response lens. More with Bret Padres at @CrypsisGroup: https://t.co/kRvpCANOgl
Open

Cyberinsurance: The value from an incident response lens

Cyberinsurance is not new to the scene, and an increasing number of organizations are accepting its critical role in safeguarding them against costly

On Feb 15, 2020
@davemcclure shared
RT @Techmeme: EFF's first staff lawyer reflects on how the debate around online speech has evolved and where he thinks the early internet activists got things right and wrong (@sfmnemonic / Slate) https://t.co/NctdBkyetl https://t.co/EDtwqOuGUR
Open

Did the Early Internet Activists Blow It?

These days, I often hear that the internet has allowed too much free speech. But I can’t get used to that idea.