In the Last 15 days there's been 59 influencers like cyberdefensemag and InfosecurityMag, discussing topics such as #cybersecurity, #SECURITYand #CYBER.



Trends


Top hashtags

Top influencers

cyberdefensemag
InfosecurityMag
whitehatsec
SecurityWeek
CyberScoopNews
InsideCyber
cylanceinc
ericgeller
politico

Top sources

cyberdefensemagazine.com
infosecurity-magazine.com
threatvector.cylance.com
cyberscoop.com
securityweek.com
insidecybersecurity.com
forbes.com
darkreading.com
politico.com

News

The CyberWire Daily Podcast

On Jun 3, 2019
@AccentureSecure shared
RT @thecyberwire: #CWPodcast Partner is Justin Harvey from Accenture on the dramatic increase in targeted #ransomware. @jbharvey @Accenture Check out the podcast: https://t.co/9Eh361Oc4O
Open

HiddenWasp backdoors Linux systems, and aims at more than the usual coinmining or DDoS. Thousands of Huawei and ZTE devices remain in US Federal networks--it takes time to fully implement a ban. China considers retaliation for the US Entity List as the US works to bring its allies on ...

thecyberwire.com
On Jun 3, 2019
@AccentureSecure shared
RT @thecyberwire: #CWPodcast Partner is Justin Harvey from Accenture on the dramatic increase in targeted #ransomware. @jbharvey @Accenture Check out the podcast: https://t.co/9Eh361Oc4O
Open

The CyberWire Daily Podcast

HiddenWasp backdoors Linux systems, and aims at more than the usual coinmining or DDoS. Thousands of Huawei and ZTE devices remain in US Federal networks--it takes time to fully implement a ...


On Jun 7, 2019
@SANSInstitute shared
RT @CertifyGIAC: #FACTFRIDAY: Knowledge is KEY to growth! Check out the top 2019 cyber facts: https://t.co/eyVCAXGX2g #cyberthreat #cyberawareness #cybersecuritycertification #cyberhack @CertifyGIAC
Open
On Jun 12, 2019
@cyberdefensemag shared
@cyberdefensemag Publisher @miliefsky Sharing an important story about Smart Home Cyber Security #cybersecurity #CYBER #SECURITY in this #CDM #EXCLUSIVE https://t.co/andIk9aCu8 by Matthew James @matthewjames.writer who we hope to see @BlackHatEvents https://t.co/aFqb3PhNyg
Open

Smart Home Cyber Security

This level of automation and technological upgrades of our houses and everyday lives has also improved our comfort levels and convenience in life. Smart Televisions Smart television sets ...

On Jun 12, 2019
@ericgeller shared
Scoop from @KimZetter: Wyden and Klobuchar have asked the FBI if it examined VR Systems' network for signs of a Russian breach or reviewed the report that FireEye did for VR. Letter: https://t.co/7hTD9z6j8e Story: https://t.co/JO5s0ycl1R MC preview: https://t.co/Mx8ZcPM7a1 https://t.co/knEdyndJvI
Open

DoD contractor cybersecurity provisions in Senate policy bill

Report: DNS firewalls key to avoiding breaches — House panel takes up IoT security legislation today

On Jun 14, 2019
@CiscoSecurity shared
Did you know that more than half of all malicious attachments are regularly used document types? Read our latest #CiscoCR report on email attacks and how to protect against #phishing, fraud, and other scams https://t.co/YEFzM0n3pA https://t.co/gqntjUzbSW
Open

2018 Annual Cybersecurity Report

See the latest threat intelligence and key security trends

On Jun 4, 2019
@rapid7 shared
What are the most common cyber security attacks being performed today? https://t.co/8FkQgp9osO
Open

Common Types of Cybersecurity Attacks

What are the most common cyber security attacks being performed today? Let us tell you about them. Learn more.

On Jun 3, 2019
@symantec shared
Get your weekly dose of #cybersecurity news. With #ransomware making headlines again, we're chatting through recovery services. Listen now. https://t.co/VhpVIsRU8C https://t.co/AvNaOXyU06
Open

Symantec Cyber Security Brief Podcast

On this week’s Cyber Security Brief podcast, we discuss our new research into the Elfin espionage group, which we have seen targeting multiple organisations in Saudi Arabia and the U.S. We ...

On Jun 3, 2019
@InfosecurityMag shared
DDoS Botnets are Back and Poised to Do Damage #NextGenInfosec https://t.co/0b3ANtD0xN
Open

DDoS Botnets are Back and Poised to Do Damage

To lessen the threat of botnets, it's critical for users to be more conscious of their own security

On Jun 15, 2019
@whitehatsec shared
As cyber crime continues to increase in frequency, learning how to respond to threats is crucial. @Forbes shares 4 steps to prepare for cyber security threats: https://t.co/mqVmiBxBbF https://t.co/2hZqs2cKO3
Open

How To Respond To A Cybersecurity Threat In 4 Steps

As more business becomes digital and data governs more of our lives, cybersecurity incidents are climbing in frequency, intensity and innovation.

On Jun 4, 2019
@Treadstone71LLC shared
Cyber Warfare And The Future Of Cyber Security - Tech Times - Business Fast https://t.co/H18bvgkUq8
Open

Cyber Warfare And The Future Of Cyber Security – Tech Times

Cyber warfare was a staple of movies in the 1990s: just think of Tron, Hackers, or the classic (and terrible) WarGames. In 2019, though, cyber warfare is no longer science fiction. ...

Browse topics

Get updates live! Follow us on

Subscribe to our mailing list

On Jun 6, 2019
@kaspersky shared
The challenge for #DigitalClutter is especially alarming for SMBs. Learn more about the threats of digital clutter at work: https://t.co/2TVDbhz767 https://t.co/slPw6LqFaD
Open

Sorting Out Digital Clutter In Business

In an increasingly digital world we are creating digital documents and files at an unstoppable rate. Working environments have transformed and, while we're no longer surrounded by filing ...

On Jun 10, 2019
@AccentureSecure shared
RT @BizTechMagazine: Even as financial services companies protect themselves against #malware, new threats such as #wiperware are creating serious problems. https://t.co/ixT3KGhpdg
Open

5 Evolving Cyberthreats Face the Financial Services Sector

According to a new report, common cyber attacks on the financial sector are evolving in ways that could have major impacts on individual organizations and the entire global sector.

On Jun 5, 2019
@cylanceinc shared
To effectively deal with the growing threats in a timely and efficient manner, automation is key. And, when it comes to automation, there’s a smarter way to prevent attacks from compromising endpoints: #artificialintelligence. Learn more: https://t.co/vW43omT9AK https://t.co/2m6GM8YSQb
Open

Click here to read the article

Given the global cybersecurity skills shortage, endpoint security solutions must improve threat prevention efficacy, simplify the investigations process, and offer automated remediation ...

On Jun 7, 2019
@cylanceinc shared
CyberTitan 2019: Introducing STEM Students to #Cybersecurity -- Take a journey with @kim_crawley as she visits the 2nd National CyberTitan Finals, a competition that has high school teams across the country compete to defend against simulated cyberattacks. https://t.co/HTY4n2o3Rr https://t.co/3uxNwjDeZj
Open

CyberTitan 2019: Introducing STEM Students to Cybersecurity

CyberTitan is Canada’s answer to CyberPatriot in the United States. The objective is to get students interested in cybersecurity. I traveled to Ottawa, the capital of Canada, to visit the ...

On Jun 14, 2019
@whitehatsec shared
As AI and machine learning have increased in popularity, how do they fit in with cyber security? @Forbes shares the hype vs. reality >> https://t.co/FKeolbU6BE https://t.co/U2KHR24UVH
Open

Machine Learning And Artificial Intelligence In Cybersecurity: Hype Versus Reality

When trained properly by experts with data science and cybersecurity expertise, AI/ML can be an important addition to the cybersecurity defense-in-depth arsenal. However, we are still far ...

On Jun 10, 2019
@RSAsecurity shared
Attending #SINETNY? Hear from RSA President @rohit_ghai and other industry leaders on managing the risks associated with #DigitalTransformation during a @SINETconnection panel on 6/13: https://t.co/gckAFjMEhE https://t.co/gO7E1SX02B
Open

NEW YORK – JUNE 2017 – THE TIMESCENTER

Moderator: William Beer, Principal, Advisory Services Cybersecurity, EY Panelist: James Beeson, Chief Information Security Officer, CignaRandy Miskanic, Americas Regional Head, Group ...

On Jun 13, 2019
@cylanceinc shared
NEW! #InSecurityPodcast: BlueKeep - It’s Not Just About the Worm. #BlueKeep... What is it? Where did it come from? And after #WannaCry, Petya, NotPetya, why is this happening again? Catch the full #podcast with special guests @KipBoyle @RCMelick. https://t.co/KvdjpuC0aM https://t.co/cCjmEIA8Ge
Open

BlueKeep: It’s Not Just About The Worm

In this very special episode of the InSecurity Podcast, Matt Stephenson is joined by best-selling cybersecurity author Kip Boyle, Automox’s Richard Melick, and BlackBerry Cylance’s Scott ...

On Jun 3, 2019
@Treadstone71LLC shared
Cyber Warfare – The Way Forward https://t.co/fsJ1w6ivbn
Open

Cyber Warfare – The Way Forward

Our political, social, and personal will can only uplift us in this industry as progressive learning is what counts in our capacity building.

On Jun 3, 2019
@threatintel shared
8 cyber security professionals share their essential reads https://t.co/RkzqZ2RYNs #books #reading https://t.co/8DDHP65sHu
Open

8 cyber security professionals share their essential reads

Ahead of World Book Day, 8 Symantec cyber security professionals share their recommendations for the essential books they turn to.

On Jun 12, 2019
@InfosecurityMag shared
The Big Connect: How Data Science is Helping Cybersecurity https://t.co/TsO5ucsmKB
Open
On Jun 10, 2019
@cyberdefensemag shared
@CyberDefenseMag Publisher @Miliefsky shares a deeper dive into traditional infosec solutions vs an artificially intelligent #SIEM by @Seceon https://t.co/ypyrWCUdYY and why #GOOD #SECURITY is #NOT #GOOD #ENOUGH https://t.co/wlUCrC5iO1
Open

AV + EDR versus aiSIEM: Good Security is NOT Good Enough

Sunil brings technical leadership with over two decades of experience in software development and methodologies, architecting and delivering complex Cybersecurity, Big Data Analytics (Time ...