Cybersecurity Essentials

Companies and Services

Cyber criminals are getting smarter and strive to find new ways to sneak into a company’s information systems. In order to minimize cybercrimes, companies in the space are putting their best efforts in combating those threats thanks to innovative solutions.

Monthly report: October 2019

This month, The Essentials Report, has curated & analyzed the content published by 126 influencers like SearchSecurity.com and RSA Conference, discussing hashtags such as #cybersecurity , #ciso and #security.
Read our monthly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in October 2019

Global Discussions Across the Web
Topics discussed by the influencers
circles
Popular with our readers

Best articles in October 2019

@RSAConference shared
On Oct 16, 2019
RT @tradeshownews: RSA Conference 2020 Opens Call for Submissions for RSAC Innovation Sandbox Contest and RSAC Launch Pad https://t.co/YdPXSlhnc3 #RSAC
Open

RSA Conference 2020 Opens Call for Submissions for RSAC Innovation

RSA® Conference, the world’s leading information security conferences and expositions, today announced that submissions for the 15th annual RSAC Innov

@RSAConference shared
On Oct 16, 2019
RT @tradeshownews: RSA Conference 2020 Opens Call for Submissions for RSAC Innovation Sandbox Contest and RSAC Launch Pad https://t.co/YdPXSlhnc3 #RSAC
Open
RSA Conference 2020 Opens Call for Submissions for RSAC Innovation

RSA Conference 2020 Opens Call for Submissions for RSAC Innovation

RSA® Conference, the world’s leading information security conferences and expositions, today announced that submissions for the 15th annual RSAC Innov

@alexstamos shared
On Oct 20, 2019
@oliviasolon @Moonalice @annawiener @susanthesquark Another great example is the discussion around the important Times piece on child sexual abuse materials. https://t.co/mMGO4cpLfl
Open

The Internet Is Overrun With Images of Child Sexual Abuse. What Went Wrong?

Online predators create and share the illegal material, which is increasingly cloaked by technology. Tech companies, the government and the authorities are no match.

@alexstamos shared
On Oct 20, 2019
@oliviasolon @Moonalice @annawiener @susanthesquark Another great example is the discussion around the important Times piece on child sexual abuse materials. https://t.co/mMGO4cpLfl
Open
The Internet Is Overrun With Images of Child Sexual Abuse. What Went Wrong?

The Internet Is Overrun With Images of Child Sexual Abuse. What Went Wrong?

Online predators create and share the illegal material, which is increasingly cloaked by technology. Tech companies, the government and the authorities are no match.

@SecurityExpert shared
On Oct 17, 2019
Cybersecurity & data privacy trends in 2020 | ITProPortal https://t.co/lnhWQteuEQ
Open

Cybersecurity & data privacy trends in 2020

2020 will be the year when multiple nascent cybersecurity trends converge.

@SecurityExpert shared
On Oct 17, 2019
Cybersecurity & data privacy trends in 2020 | ITProPortal https://t.co/lnhWQteuEQ
Open
Cybersecurity & data privacy trends in 2020

Cybersecurity & data privacy trends in 2020

2020 will be the year when multiple nascent cybersecurity trends converge.

@SANSInstitute shared
On Oct 23, 2019
Listen to real-world examples of context-aware #malware that circumvent detection and tips for building a better defense with SANS @13M4C and @vmray Tamas Boczan and Ben Abbott. Register: https://t.co/qA3pZhYp9u https://t.co/ZLeVamNJKI
Open

Evade Me If You Can: Unmasking Context-Aware Malware

Why are targeted attacks a critical threat to cybersecurity infrastructure?The threat actors behind targeted attacks have long-term goals in mind (political, monetary, trade secrets, etc.). ...

@SANSInstitute shared
On Oct 23, 2019
Listen to real-world examples of context-aware #malware that circumvent detection and tips for building a better defense with SANS @13M4C and @vmray Tamas Boczan and Ben Abbott. Register: https://t.co/qA3pZhYp9u https://t.co/ZLeVamNJKI
Open
Evade Me If You Can: Unmasking Context-Aware Malware

Evade Me If You Can: Unmasking Context-Aware Malware

Why are targeted attacks a critical threat to cybersecurity infrastructure?The threat actors behind targeted attacks have long-term goals in mind (political, monetary, trade secrets, etc.). ...

@CISOMAG shared
On Oct 24, 2019
The U.S. legislation recently proposed 'Mind Your Own Business Act', which prosecutes top-level executives if their companies are found misusing citizens’ information and lying about it. https://t.co/RZLoRtq0Gt #datasecurity #cybernews #ciso #informationsecurity #unitedstates
Open

US Legislation Launches “Mind Your Own Business” Act

The U.S. legislation recently proposed Mind Your Own Business Act, which prosecutes top-level executives if their companies are found misusing citizens’ information and lying about it

@CISOMAG shared
On Oct 24, 2019
The U.S. legislation recently proposed 'Mind Your Own Business Act', which prosecutes top-level executives if their companies are found misusing citizens’ information and lying about it. https://t.co/RZLoRtq0Gt #datasecurity #cybernews #ciso #informationsecurity #unitedstates
Open
US Legislation Launches “Mind Your Own Business” Act

US Legislation Launches “Mind Your Own Business” Act

The U.S. legislation recently proposed Mind Your Own Business Act, which prosecutes top-level executives if their companies are found misusing citizens’ information and lying about it

@SCMagazine shared
On Oct 23, 2019
Tips for those of all ages interested in pursuing a career in cybersecurity #NCSAM - more from Charles Poff at @SailPoint: https://t.co/cVCbtMzWOZ
Open

Tips for those of all ages interested in pursuing a career in cybersecurity

Today, we are facing a frightening shortage of cybersecurity professionals in the workforce. Specifically, this widening gap is expected to lead to 3.5

@SCMagazine shared
On Oct 23, 2019
Tips for those of all ages interested in pursuing a career in cybersecurity #NCSAM - more from Charles Poff at @SailPoint: https://t.co/cVCbtMzWOZ
Open
Tips for those of all ages interested in pursuing a career in cybersecurity

Tips for those of all ages interested in pursuing a career in cybersecurity

Today, we are facing a frightening shortage of cybersecurity professionals in the workforce. Specifically, this widening gap is expected to lead to 3.5

@RSAConference shared
On Oct 21, 2019
Former Twitter #CISO shares his advice for IT #security hiring and #cybersecurity: https://t.co/LhWL8rg69z via @ZDNet & @billdetwiler
Open

Former Twitter CISO shares his advice for IT security hiring and cybersecurity

Michael Coates, CEO & Co-Founder of Altitude Networks and the former CISO at Twitter, share best practices for building strong security teams and for starting a career in cybersecurity.

@RSAConference shared
On Oct 21, 2019
Former Twitter #CISO shares his advice for IT #security hiring and #cybersecurity: https://t.co/LhWL8rg69z via @ZDNet & @billdetwiler
Open
Former Twitter CISO shares his advice for IT security hiring and cybersecurity

Former Twitter CISO shares his advice for IT security hiring and cybersecurity

Michael Coates, CEO & Co-Founder of Altitude Networks and the former CISO at Twitter, share best practices for building strong security teams and for starting a career in cybersecurity.

@CSOonline shared
On Oct 15, 2019
RT @NetworkWorld: . @VMware finalized its purchase of #CarbonBlack and in the process created a new business unit that will target #cybersecurity and analytics to protect networked enterprise resources. https://t.co/MANPfFPsXE @Mcooney59 @joltsik #networksecurity
Open

VMware builds security unit around Carbon Black tech

VMware has wrapped up its $2.1 billion buy of cloud-native endpoint security vendor Carbon Black to provide more comprehensive integrated security.

@CSOonline shared
On Oct 15, 2019
RT @NetworkWorld: . @VMware finalized its purchase of #CarbonBlack and in the process created a new business unit that will target #cybersecurity and analytics to protect networked enterprise resources. https://t.co/MANPfFPsXE @Mcooney59 @joltsik #networksecurity
Open
VMware builds security unit around Carbon Black tech

VMware builds security unit around Carbon Black tech

VMware has wrapped up its $2.1 billion buy of cloud-native endpoint security vendor Carbon Black to provide more comprehensive integrated security.

Top Influencers

Picture of @SearchSecurity

The latest cybersecurity news, tips and features from the reporters and editors of https://t.co/EujY5eXSBC. Security threats, data breaches, research and more.

Follow 26.3k Followers

Picture of @RSAConference

#RSAC: Where the world talks #security

Follow 62.6k Followers

Picture of @SonicWall

Award-winning firewalls and #cybersecurity solutions. Protecting SMBs, enterprises and governments from advanced cyber attacks for three decades.

Follow 31.7k Followers

Picture of @TripwireInc

The leading provider of security, compliance and IT operations solutions for enterprises, industrial organizations, service providers and government agencies.

Follow 44.5k Followers

Picture of @SANSInstitute

SANS is the most trusted and by far the largest source for information & cyber security training, certification and research in the world.

Follow 122.0k Followers

Picture of @CISOMAG

Read News, views, research & insights on information security with a focus on the CIO/CISO/CSO community on https://t.co/riPKoTXJSz

Follow 613.0 Followers

Picture of @ZDNet

Where technology means business

Follow 443.8k Followers

Picture of @SCMagazine

The official Twitter feed for all things IT security. Like us on http://t.co/FjXz6RfGEC

Follow 114.1k Followers

Picture of @CSOonline

From IDG. CSO provides news, analysis and research on security and risk management.

Follow 52.9k Followers

Picture of @cyberwar

Author, lecturer, consultant

Follow 65.8k Followers

Picture of @securitymag

Security professionals source for business news. Follow for breaking news, articles and polls to help security executives keep up on evolving risk landscape.

Follow 23.9k Followers

Picture of @kaspersky

Kaspersky is the world’s largest privately held vendor of Internet security solutions for businesses and consumers. For help and support, tweet @kl_support

Follow 306.2k Followers

Picture of @elinormills

Senior VP of Content and Media Strategy at Bateman Group, hacker enthusiast. "I love humans -- they're just not my favorite animal." --Ricky Gervais

Follow 11.8k Followers

Picture of @alexstamos

Recovering CISO teaching and researching safe tech at the Stanford Internet Observatory. “Less diplomatic on Twitter...” - DigiDay

Follow 56.7k Followers

Picture of @SecurityExpert

UK Cyber Information Security Expert, Blogger, Writer & Security Professional CISSP, certified Computer Hacking Forensic Investigator, ISO27001 Lead & PCI ISA.

Follow 10.4k Followers

Picture of @ISC2

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world.

Follow 55.7k Followers

Picture of @lennyzeltser

Advances information security. Grows tech businesses. Fights malware. // VP of Product @AxoniusInc, Instructor and Author @SANSInstitute

Follow 41.3k Followers

Picture of @WeldPond

Co-founder and CTO Veracode. Black Hat Review Board. Former L0pht security researcher. Hackers make trouble.

Follow 48.9k Followers

Picture of @anton_chuvakin

Information security #InfoSec - #SIEM, #DFIR, #EDR ... formerly VP & Distinguished Analyst at Gartner! Now doing security product strategy @Google #Cloud

Follow 28.5k Followers

Picture of @hrbrmstr

Don't look at me…I do what he does—just slower. ½Miller½Holden. 🇷 #rstats avuncular • pampa • #tired • 👨‍🍳 • ✝️ • Prìomh Neach-saidheans Dàta @ @rapid7

Follow 11.3k Followers