In the Last 15 days there's been 59 influencers like cyberdefensemag and whitehatsec, discussing topics such as #cybersecurity, #SECURITYand #CDM.



Trends


Top hashtags

Top influencers

cyberdefensemag
whitehatsec
DarkReading
CTIN_Global
InfosecurityMag
CyberScoopNews
RSAConference
SCMagazine
politico

Top sources

cyberdefensemagazine.com
darkreading.com
infosecurity-magazine.com
politico.com
forbes.com
scmagazine.com
securityweek.com
cyberscoop.com
blog.rapid7.com

News

Teaching Cybersecurity

On Apr 13, 2019
@KimZetter shared
RT @0xmchow: “Most computer science departments don’t even teach security.” There, I said it. On public record. https://t.co/VFyijyNnrB
Open

Teaching Cybersecurity at Tufts University

tuftsmagazine.com
On Apr 13, 2019
@KimZetter shared
RT @0xmchow: “Most computer science departments don’t even teach security.” There, I said it. On public record. https://t.co/VFyijyNnrB
Open

Teaching Cybersecurity

Teaching Cybersecurity at Tufts University


On Apr 17, 2019
@CTIN_Global shared
Iasiello_E: Artificial Intelligence: A Cybersecurity Solution or the Greatest Risk of All? https://t.co/RebtEtVHVF
Open

Artificial Intelligence: A Cybersecurity Solution or the Greatest Risk of All?

AI is widely considered a powerhouse that has yet to unleash its full potential. But in the face of rising cybercrime rates, one question seems especially pertinent: is AI a solution for ...

On Apr 17, 2019
@CTIN_Global shared
Iasiello_E: The Business of Organised Cybercrime https://t.co/TNp3xgRF2J
Open

The Business of Organised Cybercrime

Cybercrime is a term that is thrown around a lot. For mainstream media the term can encompass everything from cyber warfare right the way through to the stereotypical loner, hacking from ...

On Apr 16, 2019
@DarkReading shared
New Attacks (and Old Attacks Made New) https://t.co/ZD6FL8oaTT by Derek Manky #mobile #malware #stenography #physical #security
Open

New Attacks (and Old Attacks Made New)

Although new attacks might get the most attention, don't assume old one have gone away.

On Apr 12, 2019
@cylanceinc shared
Prevention and Detection: Two Sides of the Same Coin. Learn more: https://t.co/em9Gv9Z8tx #cybersecurity #security https://t.co/sENKM5kmQP
Open

CylanceOPTICS AI Based Prevention and Detection

Instead, it uses artificial intelligence (AI) that is based on machine learning to automatically — without human intervention — distinguish good (benign) files or activity from bad ...

On Apr 16, 2019
@DarkReading shared
Meet Scranos: New Rootkit-Based Malware Gains Confidence https://t.co/9VphuJD7aN by @kellymsheridan #malware #rootkit #cyberattack
Open

Meet Scranos: New Rootkit-Based Malware Gains Confidence

The cross-platform operation, first tested on victims in China, has begun to spread around the world.

On Apr 11, 2019
@cyberdefensemag shared
@cyberdefensemag Publisher @miliefsky Sharing an important story about The most dangerous attack vector in modern days #cybersecurity #CYBER #SECURITY in this #CDM #EXCLUSIVE https://t.co/YLX5k2mNJM by Pedro Tavares @sirpedrotavares who we hope to see @BlackHatEvents https://t.co/rEF0pzTWCm
Open

The art of phishing and how to fight it

By Pedro Tavares, CSIRT.UBI Co-Founder Cybercriminals continue using phishing attacks as an effective “cyber weapon”. These attacks usually occur after a data breach and the criminals ...

On Apr 11, 2019
@hrbrmstr shared
Def have much respect for the Emotet-ers. Yes, they're evil thieves, but they actually work what they steal vs those who setup the inane compliance/regulatory money-making "legit" regimes that orgs have to live under which let Emotet-like things thrive. https://t.co/GFojqdsAEq
Open

Emotet hijacks email conversation threads to insert links to malware

Emotet gang takes their operation to a whole new level, showing why they're today's most dangerous malware.

On Apr 18, 2019
@CiscoSecurity shared
Somehow we went from "You've Got Mail" to "You've Got Malware." Our expert examines how email went from novelty to security risk: https://t.co/Rb5K8063ky https://t.co/0ksDCGqrP5
Open

Email – From Novelty to Nefarious

How a revolutionary technology was usurped for evil, and what we can do about it Since its inception, email has gone from a novelty, to a necessity, to at...

On Apr 16, 2019
@symantec shared
RT @NortonOnline: Did you know? Norton has evolved beyond antivirus? Learn how new Norton 360 provides comprehensive protection. https://t.co/TOF5fRv9cO https://t.co/phrHPNSuYk
Open

The evolution of Norton™ 360: A brief timeline of cyber safety

The evolution of Norton 360 : A brief timeline of cyber security

Browse topics

Get updates live! Follow us on

Subscribe to our mailing list

On Apr 12, 2019
@whitehatsec shared
Few leaders give thought to the human factor and stress triggers in cyber security. What can be done to help support cyber security pros in becoming more effective w/o compromising their mental health? Read more: https://t.co/N2NRShbcF7 via @Forbes https://t.co/Jx4QNAtP5N
Open

Defending The Defenders Of The Cyber Universe: How To Mitigate Stress In Cybersecurity

The cyber battle rages on, which means the defenders of the cyber universe need to be looked after, and reinforcements are desperately needed.

On Apr 17, 2019
@SCMagazine shared
Lessons Learned: What Uber’s Approach to Decentralization Can Teach the Cybersecurity Industry l https://t.co/vxXrLnkjwi @IRONSCALES
Open

Lessons Learned: What Uber’s Approach to Decentralization Can Teach the Cybersecurity Industry

Notorious Uber founder Travis Kalanick’s idea for a decentralized transportation system in which any person with a valid license, no criminal history and

On Apr 18, 2019
@STOPTHNKCONNECT shared
RT @garyjdavis: For more help, check out our blog on digital spring cleaning tips here: https://t.co/73qNzvAEoe #ChatSTC https://t.co/VwnDA1Zf6O
Open

Kick Off Your Digital Spring Cleaning Efforts During World Backup Day

It’s imperative to ensure your information is organized and backed up—not just for peace-of-mind, but to protect yourself against potential threats. Jumpstart your digital spring cleaning ...

On Apr 19, 2019
@cylanceinc shared
Report Sheds Light on Massive #Ransomware Problem via @kim_crawley https://t.co/8g8x2J2QHd #infosec #security #cybersecurity https://t.co/eAyz0gVe3f
Open

Report Sheds Light on Massive Ransomware Problem

Datto, a managed service provider of IT services, recently released their 2018 Global State of the Channel Ransomware Report, in which they surveyed over 2,400 IT professionals from around ...

On Apr 12, 2019
@cyberdefensemag shared
@cyberdefensemag Publisher @miliefsky Sharing an important story about The Key to Cyber Security Lies #cybersecurity #CYBER #SECURITY in this #CDM #EXCLUSIVE https://t.co/wluEOMd3ju by Kayla Elliott @pcmaticpro who we hope to see @BlackHatEvents https://t.co/ahcWzximyP
Open

Cyber defense is all about the offense

By Kayla Elliott, PR & Marketing Manager, PC Matic Pro Best practices. With the increased importance placed on technology in normal business practices, it is critical employees understand ...

On Apr 16, 2019
@CTIN_Global shared
Iasiello_E: Among Cybersecurity Pros, Security Paranoia Runs Deep https://t.co/C7M7iJVfra
Open

Home » Cybersecurity » CISO Suite » Among Cybersecurity Pros, Security Paranoia Runs Deep Among Cybersecurity Pros, Security Paranoia Runs Deep

Cybersecurity pros are a paranoid bunch, so says a survey conducted at the RSA Conference in March by Lastline. And it makes sense.

On Apr 13, 2019
@CTIN_Global shared
Iasiello_E: Improving railroad cyber-threat resilience https://t.co/i7CfRhFO7p
Open

Improving railroad cyber-threat resilience

Railroads are a critical component of America’s transportation infrastructure, and have been making significant investments in advanced networked computer control systems and information ...

On Apr 16, 2019
@CyberScoopNews shared
RT @snlyngaas: Brazilian 'pirates' sail around two-factor authentication to vex banking sector https://t.co/c4nq6mJEAV
Open

Brazilian 'pirates' sail around two-factor authentication to vex banking sector

For researchers investigating malicious network activity in a given country, scanning hacker forums is like reading tea leaves. The discussion boards can provide insight about which ...

On Apr 16, 2019
@ericgeller shared
While I was out of town, @MorningCybersec ran some extra bits that I couldn't fit into my OFCIO story. Here are the links, in case you missed them: https://t.co/APwdsdGtCO https://t.co/0EdJV0sahe https://t.co/WT1XkGlk52 https://t.co/dam8mOzgT1
Open

Software bill of materials on today’s agenda

DHS official: Cyber pros can ignore politics — North Korean malware gets urgent attention

On Apr 14, 2019
@cyberdefensemag shared
@cyberdefensemag Publisher @miliefsky Sharing an important story about Shine a light on app security #cybersecurity #CYBER #SECURITY in this #CDM #EXCLUSIVE https://t.co/kKYtMKQeYm by Min Pyo Hong @seworks who we hope to see @BlackHatEvents https://t.co/nyfItLUdM0
Open

Shine a light on app security

By Min Pyo Hong, CEO, and Founder, SEWORKS Cybersecurity and protecting the network reside squarely in the corporate IT spotlight, yet there’s a shadow area where it’s time to shine a ...

On Apr 13, 2019
@CTIN_Global shared
Iasiello_E: MALWARE EMOTET USING NORTH KOREAN TRICKS TO SHOW ITS STILL KING https://t.co/iiuw9d29sa
Open

Malware Emotet Using North Korean Tricks to Show Its Still King

Emotet is possibly the most dangerous malware in the world that is not sponsored by a government and with the new tactics they are using, they have upgraded their arsenal.