Hacking & Cybersecurity

Monthly report: December 2018

This month, The Essentials Report, has curated & analyzed the content published by 174 influencers like RSA and Cylance Inc., discussing hashtags such as #cybersecurity , #INFOSEC and #AI.
Read our monthly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in December 2018

Global Discussions Across the Web
Topics discussed by the influencers
circles
Popular with our readers

Top Hashtags & Sources

Hashtags our readers care about

Top Mentioned Sources

Best articles in December 2018

Symantec Cyber Security Brief Podcast

On Jul 13, 2018
@threatintel shared
#FridayFact: At least one software update supply chain took place each month in 2017. Hear more about these attacks in our latest #CyberSecurityBrief podcast: https://t.co/Jz6GCQsF0W https://t.co/LSc3MBTgAr
Open

Your weekly dose of cyber security news, hosted by threat researchers from Symantec Security Response Subscribe Apple Android In this week’s podcast, we discuss software supply chain attacks, a subject we wrote about in this year’s ISTR. Software supply chain attacks increased by 200 ...

www.symantec.com
On Jul 13, 2018
@threatintel shared
#FridayFact: At least one software update supply chain took place each month in 2017. Hear more about these attacks in our latest #CyberSecurityBrief podcast: https://t.co/Jz6GCQsF0W https://t.co/LSc3MBTgAr
Open

Symantec Cyber Security Brief Podcast

Your weekly dose of cyber security news, hosted by threat researchers from Symantec Security Response Subscribe Apple Android In this week’s podcast, we discuss software supply chain ...

8 cyber security professionals share their essential reads

On Apr 19, 2017
@threatintel shared
What should you be reading if you want to get into #infosec? 8 Symantec pros reveal their top reads https://t.co/RkzqZ2RYNs #WednesdayWisdom
Open

Ahead of World Book Day, 8 Symantec cyber security professionals share their recommendations for the essential books they turn to.

medium.com
On Apr 19, 2017
@threatintel shared
What should you be reading if you want to get into #infosec? 8 Symantec pros reveal their top reads https://t.co/RkzqZ2RYNs #WednesdayWisdom
Open

8 cyber security professionals share their essential reads

Ahead of World Book Day, 8 Symantec cyber security professionals share their recommendations for the essential books they turn to.

Exclusive Interview: The Future of Cybersecurity with Dr. David G. DeWalt

On May 23, 2018
@cyberdefensemag shared
“IP portfolio development is a game of inches. Execution is a game of miles. Focus on how to grow, sell, manage, distribute & create profit, than spend precious cycles building IP portfolios that will only become valuable to lawyers." Dr. David G. DeWalt https://t.co/eSNpJ3JBss https://t.co/DVmywt8GFK
Open

Dr. David G. DeWalt calls these “super cyber cycles” whereby these threat cycles drive vendor spending and investments, when he talks about biggest gaps, it’s the offense or the threat vs commercial defense. According to Dr. DeWalt, the speed of innovation is driving vulnerabilities ...

On May 23, 2018
@cyberdefensemag shared
“IP portfolio development is a game of inches. Execution is a game of miles. Focus on how to grow, sell, manage, distribute & create profit, than spend precious cycles building IP portfolios that will only become valuable to lawyers." Dr. David G. DeWalt https://t.co/eSNpJ3JBss https://t.co/DVmywt8GFK
Open

Exclusive Interview: The Future of Cybersecurity with Dr. David G. DeWalt

Dr. David G. DeWalt calls these “super cyber cycles” whereby these threat cycles drive vendor spending and investments, when he talks about biggest gaps, it’s the offense or the threat vs ...

What is Living off the Land?

On Oct 21, 2018
@symantec shared
Living off the land takes on a whole new meaning in the cyber landscape. Learn more about this cyber criminal activity and how to combat it. https://t.co/vbtmKg1k5G
Open

Living off the Land (LotL) has been a buzzword in cyber security for the last few years — but what does it mean?

medium.com
On Oct 21, 2018
@symantec shared
Living off the land takes on a whole new meaning in the cyber landscape. Learn more about this cyber criminal activity and how to combat it. https://t.co/vbtmKg1k5G
Open

What is Living off the Land?

Living off the Land (LotL) has been a buzzword in cyber security for the last few years — but what does it mean?

Smart Cities: Could These IoT Design Flaws Put The Lights Out?

On Dec 30, 2018
@RSAsecurity shared
As #IoT evolves and more cities and organizations become connected, the need to manage #cybersecurity risk grows, RSA CTO @Zulfikar_Ramzan explains to @Forbes: https://t.co/Hb2Byi30av
Open

Smart cities are warned to revisit their operational technology (OT) security after major design flaws uncovered in machine-to-machine IoT protocols could threaten to put the lights out.

www.forbes.com
On Dec 30, 2018
@RSAsecurity shared
As #IoT evolves and more cities and organizations become connected, the need to manage #cybersecurity risk grows, RSA CTO @Zulfikar_Ramzan explains to @Forbes: https://t.co/Hb2Byi30av
Open

Smart Cities: Could These IoT Design Flaws Put The Lights Out?

Smart cities are warned to revisit their operational technology (OT) security after major design flaws uncovered in machine-to-machine IoT protocols could threaten to put the lights out.

All AI is Not Equal: Choosing a Proper AI Security Solution

On Dec 6, 2018
@cylanceinc shared
Is #ML used to automate human tasks such as generating signatures faster, or is it used to develop an entirely new approach? How long has the model been trained for? https://t.co/FCG1BfIqRf #machinelearning #AI #cybersecurity https://t.co/muigqwmejH
Open

According to Gartner Research, the total market for all security will exceed $120B in 2019. However, the current hype around artificial intelligence and machine learning has created a certain amount of confusion in the marketplace. ...

threatvector.cylance.com
On Dec 6, 2018
@cylanceinc shared
Is #ML used to automate human tasks such as generating signatures faster, or is it used to develop an entirely new approach? How long has the model been trained for? https://t.co/FCG1BfIqRf #machinelearning #AI #cybersecurity https://t.co/muigqwmejH
Open

All AI is Not Equal: Choosing a Proper AI Security Solution

According to Gartner Research, the total market for all security will exceed $120B in 2019. However, the current hype around artificial intelligence and machine learning has created a ...

Conficker: Infamous Worm Turns 10 — and Is Still Detected in the Wild Today

On Dec 7, 2018
@threatintel shared
#Conficker - we take a look back at this threat and how it impacted the infosec landscape https://t.co/dd9VFHAzrx #cybersecurity https://t.co/ECT1dXWvp6
Open

Conficker is one of the most famous cyber security threats. On its 10th anniversary, we take a look back at this threat and its impact.

medium.com
On Dec 7, 2018
@threatintel shared
#Conficker - we take a look back at this threat and how it impacted the infosec landscape https://t.co/dd9VFHAzrx #cybersecurity https://t.co/ECT1dXWvp6
Open

Conficker: Infamous Worm Turns 10 — and Is Still Detected in the Wild Today

Conficker is one of the most famous cyber security threats. On its 10th anniversary, we take a look back at this threat and its impact.

60 Cybersecurity Predictions For 2019

On Dec 29, 2018
@ForbesTech shared
60 Cybersecurity Predictions For 2019: https://t.co/8x5HQMc9ko
Open

60 predictions for cybersecurity in 2019 reveal the state-of-mind of key industry participants from artificial intelligence (AI) helping both attackers and defenders to data privacy, the cloud, IoT, and the emerging global cyber war conducted by terrorists, criminals, and nation-states.

www.forbes.com
On Dec 29, 2018
@ForbesTech shared
60 Cybersecurity Predictions For 2019: https://t.co/8x5HQMc9ko
Open

60 Cybersecurity Predictions For 2019

60 predictions for cybersecurity in 2019 reveal the state-of-mind of key industry participants from artificial intelligence (AI) helping both attackers and defenders to data privacy, the ...

Top Influencers

Picture of @RSAsecurity

RSA helps organizations mitigate the risk of operating in a digital world – providing the ability to detect, investigate, & respond to advanced threats.

Follow 99.7k Followers

Picture of @cylanceinc

Prevent #cyberattacks with #ArtificialIntelligence. Need support? Contact @CylanceSupport.

Follow 8.9k Followers

Picture of @threatintel

Symantec Security Response brings you the latest threat intelligence from the IT security world.

Follow 67.5k Followers

Picture of @symantec

Helping companies, governments, and individuals secure their most important data wherever it lives. Need support? Contact @SymantecHelp

Follow 160.4k Followers

Picture of @whitehatsec

WhiteHat Security helps prevent website attacks by providing the most complete Web security solution for companies of any size.

Follow 35.1k Followers

Picture of @InfosecurityMag

The only magazine dedicated to the strategy and technology of information security, delivering critical business and technical information for IT professionals.

Follow 138.1k Followers

Picture of @SANSInstitute

SANS is the most trusted and by far the largest source for computer security, IT and information security training, certification and research in the world.

Follow 89.9k Followers

Picture of @TheHackersNews

The Hacker News – Attracting over 10 million monthly readers, #THN is a leading & trusted news source for Hackers, Technologists & Nerds. #Hacking #Security

Follow 344.0k Followers

Picture of @RSAConference

#RSAC: Helping you stay ahead of an ever-changing #security landscape.

Follow 43.1k Followers

Picture of @cyberdefensemag

Cyber Defense Magazine - The Premier Source for IT Security and Compliance Information. http://t.co/JrLHX9E64N.

Follow 155.1k Followers

Picture of @joshcorman

Director Cyber Statecraft @AtlanticCouncil | CyberSafety Advocate | Philosopher | Strategist | Co-Founder: https://t.co/szaUmgPzwT https://t.co/FOfIaMx5Tk

Follow 30.7k Followers

Picture of @rapid7

Rapid7 is engineering better security to help companies reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.

Follow 68.1k Followers

Picture of @McAfee_Labs

The official tweets of McAfee Labs. McAfee is now part of @IntelSecurity.

Follow 75.4k Followers

Picture of @gcluley

Award-winning computer security expert, writer and public speaker. Fighting cybercrime since early 1990s. Co-host of @SmashinSecurity podcast

Follow 57.9k Followers

Picture of @WIRED

WIRED is where tomorrow is realized.

Follow 8.4M Followers

Picture of @CyberScoopNews

Capitol Hill, Silicon Valley and beyond. News, analysis and commentary from cybersecurity’s cutting edge. A @ScoopNewsGroup property.

Follow 938.0 Followers

Picture of @ForbesTech

Tech news and insights from Forbes.

Follow 2.5M Followers

Picture of @CTIN_Global

Aggregating high-quality CTIN member sources with real-time posting on threats | ISAOs | CTI-TC | OSINT | Analytics | ThreatIntel | CyberSecurity | Malware

Follow 1.0k Followers

Picture of @josephmenn

Personal account for author of true cyber thriller Fatal System Error + Napster bio All the Rave, at Reuters. PGP key on LinkedIn profile. Open dms.

Follow 6.6k Followers

Picture of @dinodaizovi

Co-founder & CTO @Capsule8. Securing 🐧 with ❤️ in 🗽. Prev: @Square Mobile Security Lead. Devoted to getting to the bottom of things, not staying on top of them.

Follow 28.9k Followers