Hacking & Cybersecurity

Monthly report: January 2019

This month, The Essentials Report, has curated & analyzed the content published by 162 influencers like Cylance Inc. and RSA, discussing hashtags such as #cybersecurity , #infosec and #AI.
Read our monthly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in January 2019

Global Discussions Across the Web
Topics discussed by the influencers
circles
Popular with our readers

Top Hashtags & Sources

Hashtags our readers care about

Top Mentioned Sources

Best articles in January 2019

Malware Built to Hack Building Automation Systems

On Jan 20, 2019
@RSAConference shared
#Malware built to hack building automation systems: https://t.co/fYMc6t7hxh via @DarkReading
Open

Researchers dig into vulnerabilities in popular building automation systems, devices.

www.darkreading.com
On Jan 20, 2019
@RSAConference shared
#Malware built to hack building automation systems: https://t.co/fYMc6t7hxh via @DarkReading
Open

Malware Built to Hack Building Automation Systems

Researchers dig into vulnerabilities in popular building automation systems, devices.

RSA Conference 2019 | San Francisco, USA

On Jan 31, 2019
@RSAConference shared
RT @SelenaTempleton: Solving Our #Cybersecurity Talent Shortage | @RSAConference 2019 Monday, March 4 | 8:00 A.M. - 12:00 P.M. Moscone Center Learn, listen to & read more right here: https://t.co/XwH02s6IeM #DiversityandInclusion #CybersecurityTalentShortage #InfoSec #equity #Inclusion https://t.co/sZYbBAxFqr
Open

Tech industry giant Intel took “doing the right thing” and made it a business imperative to show how impactful true inclusion can be. Come learn the three keys to success from Intel’s Jim Gordon on how the firm’s “all-in” approach gave impressive results and some surprise benefits. The ...

www.itspmagazine.com
On Jan 31, 2019
@RSAConference shared
RT @SelenaTempleton: Solving Our #Cybersecurity Talent Shortage | @RSAConference 2019 Monday, March 4 | 8:00 A.M. - 12:00 P.M. Moscone Center Learn, listen to & read more right here: https://t.co/XwH02s6IeM #DiversityandInclusion #CybersecurityTalentShortage #InfoSec #equity #Inclusion https://t.co/sZYbBAxFqr
Open

RSA Conference 2019 | San Francisco, USA

Tech industry giant Intel took “doing the right thing” and made it a business imperative to show how impactful true inclusion can be. Come learn the three keys to success from Intel’s Jim ...

Cryptocurrency threat predictions for 2019

On Jan 25, 2019
@kaspersky shared
#ICYMI: #Cryptocurrency threat predictions for 2019 https://t.co/Yf6N7ncuhh #infosec #cybersecurity #technews https://t.co/mdv5bHFaTT
Open

In the second half of 2018, the blockchain and cryptocurrency industry faced a major development: falling prices for cryptocurrencies. The impact was felt across the landscape, with rapid decline in public interest, the activity of the crypto community and traders, and in the related ...

securelist.com
On Jan 25, 2019
@kaspersky shared
#ICYMI: #Cryptocurrency threat predictions for 2019 https://t.co/Yf6N7ncuhh #infosec #cybersecurity #technews https://t.co/mdv5bHFaTT
Open

Cryptocurrency threat predictions for 2019

In the second half of 2018, the blockchain and cryptocurrency industry faced a major development: falling prices for cryptocurrencies. The impact was felt across the landscape, with rapid ...

Machine learning trumps AI for security analysts

On Jan 26, 2019
@whitehatsec shared
Machine learning is one of the biggest buzzwords in cyber security. How can this tool be best applied to security operations? Check this out: https://t.co/pWi88SMitv via @helpnetsecurity https://t.co/dXKTdMAq2G
Open

Machine learning is an algorithm that gives the software applications it is applied to the ability to autonomously learn from its own environment.

www.helpnetsecurity.com
On Jan 26, 2019
@whitehatsec shared
Machine learning is one of the biggest buzzwords in cyber security. How can this tool be best applied to security operations? Check this out: https://t.co/pWi88SMitv via @helpnetsecurity https://t.co/dXKTdMAq2G
Open

Machine learning trumps AI for security analysts

Machine learning is an algorithm that gives the software applications it is applied to the ability to autonomously learn from its own environment.

Did IoT cyberattacks cause NY power transformers to explode?

On Jan 4, 2019
@NetworkWorld shared
Did IoT cyberattacks cause NY power transformers to explode? -- @deepak_puri breaks down how #MadIoT attacks work https://t.co/OWdKApQ5wN @IDGCN #IoT #IoTbotnet #IoTsecurity
Open

MadIoT attacks cause blackouts with an IoT botnet of compromised appliances.

www.networkworld.com
On Jan 4, 2019
@NetworkWorld shared
Did IoT cyberattacks cause NY power transformers to explode? -- @deepak_puri breaks down how #MadIoT attacks work https://t.co/OWdKApQ5wN @IDGCN #IoT #IoTbotnet #IoTsecurity
Open

Did IoT cyberattacks cause NY power transformers to explode?

MadIoT attacks cause blackouts with an IoT botnet of compromised appliances.

THE LATEST

On Jan 29, 2019
@defcon shared
RT @Niki7a: I have done my best to increase Sqft for areas at #DEFCON like @CryptoVillage, SEV/@humanhacker, @dcskytalks, Packet Hacking, @aivillage_dc , Workshops, ++ more. @defcon will post the map on https://t.co/2A15isUMPd this week so you can plan your routes. ( Hope you like it🤞) https://t.co/BwjLOcHUuz
Open

Started in 1992 by the Dark Tangent, DEF CON is the world's longest running and largest underground hacking conference. Hackers, corporate IT professionals, and three letter government agencies all converge on Las Vegas every summer to absorb cutting edge hacking research from the most ...

www.defcon.org
On Jan 29, 2019
@defcon shared
RT @Niki7a: I have done my best to increase Sqft for areas at #DEFCON like @CryptoVillage, SEV/@humanhacker, @dcskytalks, Packet Hacking, @aivillage_dc , Workshops, ++ more. @defcon will post the map on https://t.co/2A15isUMPd this week so you can plan your routes. ( Hope you like it🤞) https://t.co/BwjLOcHUuz
Open

THE LATEST

Started in 1992 by the Dark Tangent, DEF CON is the world's longest running and largest underground hacking conference. Hackers, corporate IT professionals, and three letter government ...

Artifical Intelligence in Cybersecurity Is Vulnerable

On Jan 18, 2019
@McAfee_Business shared
RT @McAfee: Celeste Fralick, chief data scientist and senior principal engineer says that #cybersecurity vendors should take the vulnerabilities of #AI into account when designing detection and classification systems. @SCMagazine shares the details. https://t.co/eRCDck0oo9
Open

By Celeste Fralick, chief data scientist and senior principal engineer, McAfee Just about everyone in the cybersecurity field has accepted the notion that

www.scmagazine.com
On Jan 18, 2019
@McAfee_Business shared
RT @McAfee: Celeste Fralick, chief data scientist and senior principal engineer says that #cybersecurity vendors should take the vulnerabilities of #AI into account when designing detection and classification systems. @SCMagazine shares the details. https://t.co/eRCDck0oo9
Open

Artifical Intelligence in Cybersecurity Is Vulnerable

By Celeste Fralick, chief data scientist and senior principal engineer, McAfee Just about everyone in the cybersecurity field has accepted the notion that

Case Study: Modernizing Cybersecurity at the Sydney Opera House

On Jan 22, 2019
@cylanceinc shared
#CaseStudy: Modernizing #Cybersecurity at the Sydney Opera House https://t.co/fE4xQV5G7N https://t.co/zdnsGrBjSh
Open

The Sydney Opera House is one of the world’s busiest performing arts centers and Australia’s number one tourist destination. On the Opera House’s 40th anniversary, it engaged VMtech and Cylance to modernize its IT server and network infrastructure, as well as information management, ...

threatvector.cylance.com
On Jan 22, 2019
@cylanceinc shared
#CaseStudy: Modernizing #Cybersecurity at the Sydney Opera House https://t.co/fE4xQV5G7N https://t.co/zdnsGrBjSh
Open

Case Study: Modernizing Cybersecurity at the Sydney Opera House

The Sydney Opera House is one of the world’s busiest performing arts centers and Australia’s number one tourist destination. On the Opera House’s 40th anniversary, it engaged VMtech and ...

Top Influencers

Picture of @cylanceinc

Prevent #cyberattacks with #ArtificialIntelligence. Need support? Contact @CylanceSupport.

Follow 8.9k Followers

Picture of @RSAsecurity

RSA helps organizations mitigate the risk of operating in a digital world – providing the ability to detect, investigate, & respond to advanced threats.

Follow 99.7k Followers

Picture of @RSAConference

#RSAC: Helping you stay ahead of an ever-changing #security landscape.

Follow 43.1k Followers

Picture of @kaspersky

Kaspersky Lab is the world’s largest privately held vendor of Internet security solutions for businesses and consumers.

Follow 274.3k Followers

Picture of @whitehatsec

WhiteHat Security helps prevent website attacks by providing the most complete Web security solution for companies of any size.

Follow 35.1k Followers

Picture of @SecurityWeek

Internet and Enterprise Security News, Threats, Insights and Expert Analysis #SCADA #infosec Coverage

Follow 107.5k Followers

Picture of @DarkReading

News and information on IT security, helping information security pros manage the balance between data protection and user access.

Follow 148.0k Followers

Picture of @SANSInstitute

SANS is the most trusted and by far the largest source for computer security, IT and information security training, certification and research in the world.

Follow 89.9k Followers

Picture of @defcon

Hacking Conference

Follow 173.2k Followers

Picture of @threatpost

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.

Follow 132.9k Followers

Picture of @NetworkWorld

The Connected Enterprise. Network World, from IDG, is the premier provider of news, intelligence and insight for network and IT executives.

Follow 102.2k Followers

Picture of @SCMagazine

The official Twitter feed for all things IT security. Like us on http://t.co/FjXz6RfGEC

Follow 95.7k Followers

Picture of @CiscoSecurity

Cisco provides unmatched visibility, continuous control & advanced threat protection across the entire attack continuum – before, during, and after an attack.

Follow 338.4k Followers

Picture of @CTIN_Global

Aggregating high-quality CTIN member sources with real-time posting on threats | ISAOs | CTI-TC | OSINT | Analytics | ThreatIntel | CyberSecurity | Malware

Follow 1.0k Followers

Picture of @Treadstone71LLC

Intelligence, Cyber Counterintel, intel tradecraft, threat intelligence analysis, training, clandestine Cyber HUMINT, Business and Competitive Intelligence

Follow 943.6k Followers

Picture of @georgevhulme

Writer • IT security • Cloud Computing • Technology • Science • Markets

Follow 15.0k Followers

Picture of @InfosecurityMag

The only magazine dedicated to the strategy and technology of information security, delivering critical business and technical information for IT professionals.

Follow 138.1k Followers

Picture of @IntelSec_Biz

@IntelSecurity news and resources on solutions for your small business or enterprise. #SecChat organizer/moderator.

Follow 44.3k Followers

Picture of @SANSDefense

The Cyber Defense Curriculum @SANS Institute is the definitive source for cyber defense news, updates and events. This is your moment!

Follow 22.0k Followers

Picture of @Mandiant

Responding to the most critical cybersecurity incidents & empowering orgs to protect their assets. A @FireEye company.

Follow 91.8k Followers