Cybersecurity Essentials

Companies and Services

Cyber criminals are getting smarter and strive to find new ways to sneak into a company’s information systems. In order to minimize cybercrimes, companies in the space are putting their best efforts in combating those threats thanks to innovative solutions.

Monthly report: November 2019

This month, The Essentials Report, has curated & analyzed the content published by 114 influencers like Sean Lyngaas and SC Media, discussing hashtags such as #Cybersecurity , #AI and #DigitalTransformation.
Read our monthly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in November 2019

Global Discussions Across the Web
Topics discussed by the influencers
circles
Popular with our readers

Best articles in November 2019

@snlyngaas shared
On Nov 6, 2019
RT @HowellONeill: New: I just visited Microsoft HQ to meet MSTIC, the team tasked with tracking and defending against the growing number of government-sponsored hackers. MSFT, which won the Pentagon’s cloud contract last week, has incredible visibility across the internet. https://t.co/GIf9XNf5mn
Open

Inside the Microsoft team tracking the world’s most dangerous hackers

From Russian Olympic cyberattacks to billion-dollar North Korean malware, how one tech giant monitors nation-sponsored hackers everywhere on earth.

@snlyngaas shared
On Nov 6, 2019
RT @HowellONeill: New: I just visited Microsoft HQ to meet MSTIC, the team tasked with tracking and defending against the growing number of government-sponsored hackers. MSFT, which won the Pentagon’s cloud contract last week, has incredible visibility across the internet. https://t.co/GIf9XNf5mn
Open
Inside the Microsoft team tracking the world’s most dangerous hackers

Inside the Microsoft team tracking the world’s most dangerous hackers

From Russian Olympic cyberattacks to billion-dollar North Korean malware, how one tech giant monitors nation-sponsored hackers everywhere on earth.

@ISC2 shared
On Nov 18, 2019
"At a time when cyber risks are proliferating at a faster rate than at any time in history, organizations around the globe are struggling to find talented professionals who can help them defend against these risks." Read more from @cpomagazine: https://t.co/EIFCQMIkzX
Open

How to address the cybersecurity workforce shortage

According to the latest Cybersecurity Workforce Study from (ISC)2, it would take a 145% increase in the number of these cybersecurity professionals to fill the current estimated need for 4.07 million professionals.

@ISC2 shared
On Nov 18, 2019
"At a time when cyber risks are proliferating at a faster rate than at any time in history, organizations around the globe are struggling to find talented professionals who can help them defend against these risks." Read more from @cpomagazine: https://t.co/EIFCQMIkzX
Open
How to address the cybersecurity workforce shortage

How to address the cybersecurity workforce shortage

According to the latest Cybersecurity Workforce Study from (ISC)2, it would take a 145% increase in the number of these cybersecurity professionals to fill the current estimated need for ...

@gregotto shared
On Nov 21, 2019
Here is the full spicy article @ItsReallyNick referenced in his talk #CYBERWARCON https://t.co/Pqa50N2LID
Open

A stolen Trump-Duterte transcript appears to be just one part of a larger hacking story

A leaked transcript of a phone conversation between President Donald Trump and his Philippine counterpart was available online for weeks before surfacing in news reports, and it now appears to be just one of a series of sensitive Philippine government documents acquired by a hacker group ...

@gregotto shared
On Nov 21, 2019
Here is the full spicy article @ItsReallyNick referenced in his talk #CYBERWARCON https://t.co/Pqa50N2LID
Open
A stolen Trump-Duterte transcript appears to be just one part of a larger hacking story

A stolen Trump-Duterte transcript appears to be just one part of a larger hacking story

A leaked transcript of a phone conversation between President Donald Trump and his Philippine counterpart was available online for weeks before surfacing in news reports, and it now appears ...

@NortonOnline shared
On Nov 22, 2019
Sensitive and personal information belonging to PayMyTab customers has been exposed due to an open AWS bucket, researchers have revealed. Personally Identifiable Information (PII) and partial financial details were made available online. https://t.co/e9cF18oUCw
Open

PayMyTab data leak exposes personal information belonging to mobile diners

Data exposure was caused by an open AWS database.

@NortonOnline shared
On Nov 22, 2019
Sensitive and personal information belonging to PayMyTab customers has been exposed due to an open AWS bucket, researchers have revealed. Personally Identifiable Information (PII) and partial financial details were made available online. https://t.co/e9cF18oUCw
Open
@JimMarous shared
On Nov 18, 2019
RT @SpirosMargaris: Good read #Cybersecurity in the Age of Financial Digital #Innovation https://t.co/SXDi1t2Vh5 #fintech #insurtech #BigData #AI #ML @jesperf @okta @Shirastweet @missdkingsbury #API #banking @JimMarous @RAlexJimenez @Visible_Banking https://t.co/1aatZjuqZd
Open

Cybersecurity in the Age of Financial Digital Innovation

Brexit continues to leave the UK in a shroud of uncertainty, but this hasn’t hampered its reputation as Europe’s hub of financial digital innovation. But...

@JimMarous shared
On Nov 18, 2019
RT @SpirosMargaris: Good read #Cybersecurity in the Age of Financial Digital #Innovation https://t.co/SXDi1t2Vh5 #fintech #insurtech #BigData #AI #ML @jesperf @okta @Shirastweet @missdkingsbury #API #banking @JimMarous @RAlexJimenez @Visible_Banking https://t.co/1aatZjuqZd
Open
Cybersecurity in the Age of Financial Digital Innovation

Cybersecurity in the Age of Financial Digital Innovation

Brexit continues to leave the UK in a shroud of uncertainty, but this hasn’t hampered its reputation as Europe’s hub of financial digital innovation. But...

@ISC2 shared
On Nov 12, 2019
“Certifications validate the knowledge and skills acquired in a cybersecurity course” #CISSP @ISC2 https://t.co/CY3tEAB0qc via @CISOMAG
Open

“Certifications validate the knowledge and skills acquired in a cybersecurity course”

CISO MAG asked Julien Legrand, Operation Security Manager, Société Générale about the cybersecurity certifications that are in demand in the industry. He offers a lot of advice to aspiring cybersecurity professionals.

@ISC2 shared
On Nov 12, 2019
“Certifications validate the knowledge and skills acquired in a cybersecurity course” #CISSP @ISC2 https://t.co/CY3tEAB0qc via @CISOMAG
Open
“Certifications validate the knowledge and skills acquired in a cybersecurity course”

“Certifications validate the knowledge and skills acquired in a cybersecurity course”

CISO MAG asked Julien Legrand, Operation Security Manager, Société Générale about the cybersecurity certifications that are in demand in the industry. He offers a lot of advice to aspiring ...

@gregotto shared
On Nov 13, 2019
Someone asked me recently how I balance reporting cybersecurity in D.C. with everything else that's going on. I told them there is no balancing act. Cybersecurity touches all the stories you've been paying attention to. Case in point: https://t.co/lZQyrtRiVs
Open

Exclusive: U.S. manufacturing group hacked by China as trade talks intensified - sources

As trade talks between Washington and Beijing intensified earlier this year, sus...

@gregotto shared
On Nov 13, 2019
Someone asked me recently how I balance reporting cybersecurity in D.C. with everything else that's going on. I told them there is no balancing act. Cybersecurity touches all the stories you've been paying attention to. Case in point: https://t.co/lZQyrtRiVs
Open
Exclusive: U.S. manufacturing group hacked by China as trade talks intensified - sources

Exclusive: U.S. manufacturing group hacked by China as trade talks intensified - sources

As trade talks between Washington and Beijing intensified earlier this year, sus...

@CyrilCoste shared
On Nov 20, 2019
RT @dinisguarda: #5G, #AI – #Huawei and #Europe’s #DigitalTransformation https://t.co/Ra2dawsKpT via @intelligentHQ CC @EliseQuevedo @antgrasso @UserExperienceU @CyrilCoste @SwissCognitive @Susie_WSQ @vulicvladimir @andy_fitze @AkwyZ @AghiathChbib @sallyeaves @SpirosMargaris @YuHelenYu https://t.co/OwLfWPfWqc
Open

5G, AI – Huawei and Europe’s Digital Transformation

Huawei has a long story in Europe in bringing innovation and digital transformation as collaborations are needed in today’s world

@CyrilCoste shared
On Nov 20, 2019
RT @dinisguarda: #5G, #AI – #Huawei and #Europe’s #DigitalTransformation https://t.co/Ra2dawsKpT via @intelligentHQ CC @EliseQuevedo @antgrasso @UserExperienceU @CyrilCoste @SwissCognitive @Susie_WSQ @vulicvladimir @andy_fitze @AkwyZ @AghiathChbib @sallyeaves @SpirosMargaris @YuHelenYu https://t.co/OwLfWPfWqc
Open
5G, AI – Huawei and Europe’s Digital Transformation

5G, AI – Huawei and Europe’s Digital Transformation

Huawei has a long story in Europe in bringing innovation and digital transformation as collaborations are needed in today’s world

Top Influencers

Picture of @snlyngaas

Senior Reporter, @CyberScoopNews | Ex-freelancer in Africa sean.lyngaas[at]https://t.co/WoSbDXeDjx | Signal +1 202-763-3303. I also tweet about my dog, the newest APT

Follow 3.3k Followers

Picture of @SCMagazine

The official Twitter feed for all things IT security. Like us on http://t.co/FjXz6RfGEC

Follow 114.3k Followers

Picture of @ISC2

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world.

Follow 56.2k Followers

Picture of @gregotto

Editor-in-chief, @CyberScoopNews | Co-host of @securiositypod | Salty Philly sports fan

Follow 5.3k Followers

Picture of @TAKellermann

Head Cybersecurity Strategist at VMware & Global Fellow at the Wilson Center

Follow 992.0 Followers

Picture of @JimMarous

Global Speaker, #Banking #Fintech #AI | Co-Publisher, The Financial Brand | Owner, Digital Banking Report | Host, Banking Transformed Podcast

Follow 83.6k Followers

Picture of @CyrilCoste

Digital Transformation thoughts about #AI #Digital #Marketing #Fintech #Leadership #Blockchain #DigitalTransformation #KOL #SIEx - Principal Consultant @emergn

Follow 112.8k Followers

Picture of @NortonOnline

The official Norton account for the latest news in cyber #security. For help, tweet @NortonSupport 🙂

Follow 149.5k Followers

Picture of @NCSCgov

Advancing Counterintelligence and Security Excellence

Follow 44.5k Followers

Picture of @hackerfantastic

Team @myhackerhouse - a cybersecurity professional services & training company. Contact for a quote.

Follow 81.8k Followers

Picture of @ericgarland

Strategic intelligence analyst. Want to learn more about Trump-Russia? Check out Game Theory Today. https://t.co/JyZoGhkzgr

Follow 196.8k Followers

Picture of @ashk4n

Technologist, Consultant, Reporter, Founder, Policy Wonk -- former FTC CTO and Obama WH Senior Advisor. --- email:[firstname.lastname]@gmail.com

Follow 28.2k Followers

Picture of @KateKuehn

Mother of four, wife, Americas CEO of Senseon, and an active member of the cyber ecosystem. #cybersecurity #womenintech #womeninsecurity My views are my own.

Follow 413.0 Followers

Picture of @GlasswingVC

We are an early-stage #VC firm investing in the next generation of #AI powered-tech companies that connect consumers & enterprises and secure the ecosystem.

Follow 1.1k Followers

Picture of @gattaca

Global Advisory CISO @duosec (now @Cisco), keynote, breaker of things, dad, creator of (-:|3, Ex @IBM @AMD & @Akamai. @Forbes raconteur, gentleman spy, he/him

Follow 39.4k Followers

Picture of @CFR_org

The Council on Foreign Relations is a resource for foreign policy news and analysis. CFR takes no institutional positions on policy. Follows ≠ endorsements.

Follow 416.6k Followers

Picture of @StephaneNappo

Global Chief Information Security Officer @ https://t.co/JLVXb2w7P5 I #Technologist I #Strategist I #PhDResearcher I #Author I #Speaker I #Influencer I Global #CISO award 2018

Follow 5.2k Followers

Picture of @msuiche

Hacker. Automated Memory Analysis & Integrity at @ComaeIo, @OPCDE & #OPCDEx Email is right below 👇

Follow 29.7k Followers

Picture of @s_crawford

Pundit, airhead (AMEL, CFII), curmudgeon. Research Vice President, Infosec at 451 Research. Tweets are my own, etc.

Follow 3.0k Followers