Hacking & Cybersecurity

Monthly report: October 2018

This month, The Essentials Report, has curated & analyzed the content published by 174 influencers like Cylance Inc. and RSA Conference, discussing hashtags such as #cybersecurity , #CyberAware and #infosec.
Read our monthly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in October 2018

Global Discussions Across the Web
Topics discussed by the influencers
circles
Popular with our readers

Top Hashtags & Sources

Hashtags our readers care about

Top Mentioned Sources

Best articles in October 2018

Hunting Hidden Empires with TLS - Certified Hypotheses - SANS Cyber Threat Intelligence Summit 2018

On Oct 12, 2018
@SANSInstitute shared
SANS Cyber Threat Intelligence Summit 2018 - Talk Hunting Hidden Empires with TLS - Certified Hypotheses by @meansec @daveherrald YouTube: https://t.co/MkRRe5RVM6 Attend #CTISummit 2019: https://t.co/U2ki0nXgDy Summit Calendar: https://t.co/7eHOMwFmte https://t.co/nEg7eEHZoq
Open

The “threat hunting” landscape has drastically changed due to the increase in encrypted transport layer security (TLS) Internet traffic. The days of adversar...

www.youtube.com
On Oct 12, 2018
@SANSInstitute shared
SANS Cyber Threat Intelligence Summit 2018 - Talk Hunting Hidden Empires with TLS - Certified Hypotheses by @meansec @daveherrald YouTube: https://t.co/MkRRe5RVM6 Attend #CTISummit 2019: https://t.co/U2ki0nXgDy Summit Calendar: https://t.co/7eHOMwFmte https://t.co/nEg7eEHZoq
Open

Hunting Hidden Empires with TLS - Certified Hypotheses - SANS Cyber Threat Intelligence Summit 2018

The “threat hunting” landscape has drastically changed due to the increase in encrypted transport layer security (TLS) Internet traffic. The days of adversar...

AI is not a ‘silver bullet’ against cyber attacks

On Oct 20, 2018
@RSAsecurity shared
While many are adopting #ArtificialIntelligence for #SecOps, RSA CTO @Zulfikar_Ramzan warns that #AI can't necessarily adapt quickly enough to constantly changing hacker techniques (via @FT): https://t.co/3MHkDgw54W
Open

Machines do not yet cope well in adversarial situations

www.ft.com
On Oct 20, 2018
@RSAsecurity shared
While many are adopting #ArtificialIntelligence for #SecOps, RSA CTO @Zulfikar_Ramzan warns that #AI can't necessarily adapt quickly enough to constantly changing hacker techniques (via @FT): https://t.co/3MHkDgw54W
Open

AI is not a ‘silver bullet’ against cyber attacks

Machines do not yet cope well in adversarial situations

Tesla offers 'goodwill' to security researchers hacking its cars

On Sep 22, 2018
@CyberScoopNews shared
Tesla offers 'goodwill' to security researchers hacking its cars https://t.co/wdmXAxUVEt
Open

Go ahead and hack that car in peace. In a move greeted happily by cybersecurity researchers around the world, the electric-automobile company Tesla announced that hacking the company’s software as part of “good-faith security research” will not void your warranty. ...

www.cyberscoop.com
On Sep 22, 2018
@CyberScoopNews shared
Tesla offers 'goodwill' to security researchers hacking its cars https://t.co/wdmXAxUVEt
Open

Tesla offers 'goodwill' to security researchers hacking its cars

Go ahead and hack that car in peace. In a move greeted happily by cybersecurity researchers around the world, the electric-automobile company Tesla announced that hacking the company’s ...

US intelligence agencies see new threats from global rivals, and say it may be Cold War 2.0

On Sep 30, 2018
@Treadstone71LLC shared
Why Treadstone 71's programs are even more important and timely https://t.co/W6IJy4elka
Open

WASHINGTON - As the intelligence community shifts its primary focus from counterterrorism to threats from Russia and China, some leaders voice a sense of deja vu and even eagerness at the challenge. ...

www.msn.com
On Sep 30, 2018
@Treadstone71LLC shared
Why Treadstone 71's programs are even more important and timely https://t.co/W6IJy4elka
Open

US intelligence agencies see new threats from global rivals, and say it may be Cold War 2.0

WASHINGTON - As the intelligence community shifts its primary focus from counterterrorism to threats from Russia and China, some leaders voice a sense of deja vu and even eagerness at the ...

Burned malware returns, says Cylance report: Is Hacking Team responsible?

On Oct 23, 2018
@cylanceinc shared
RT @CSOonline: Burned #malware evolves and doesn't go away. #hacking @Cylanceinc, by @toholdaquill - https://t.co/Bm9RrWBk1I
Open

Burning malware forces attackers to evolve, not go away. Network defenders take note.

www.csoonline.com
On Oct 23, 2018
@cylanceinc shared
RT @CSOonline: Burned #malware evolves and doesn't go away. #hacking @Cylanceinc, by @toholdaquill - https://t.co/Bm9RrWBk1I
Open

Burned malware returns, says Cylance report: Is Hacking Team responsible?

Burning malware forces attackers to evolve, not go away. Network defenders take note.

Virtual Session: The Information Security Skills Gap and How We’ll Overcome It

On Oct 6, 2018
@RSAConference shared
Hear from @johnmccumber and @govcso on reversing the #infosec skills critical shortage in this #RSAC Virtual Session. Watch the recording here: https://t.co/DNoHOE3Rid
Open

RSA Conference Virtual Session - The Information Security Skills Gap and How We’ll Overcome It

www.rsaconference.com
On Oct 6, 2018
@RSAConference shared
Hear from @johnmccumber and @govcso on reversing the #infosec skills critical shortage in this #RSAC Virtual Session. Watch the recording here: https://t.co/DNoHOE3Rid
Open

Virtual Session: The Information Security Skills Gap and How We’ll Overcome It

RSA Conference Virtual Session - The Information Security Skills Gap and How We’ll Overcome It

10 signs you aren't cut out to be a cybersecurity specialist

On Oct 9, 2018
@whitehatsec shared
A career as a cybersecurity specialist requires more than just technical skills. It also takes special personality traits. Read more: https://t.co/HaqFmaw71H via @TechRepublic https://t.co/kCWdBV1ECr
Open

A career as a cybersecurity specialist requires more than just technical skills. Cybersecurity professionals also tend to have specific personalities. Do you qualify?

www.techrepublic.com
On Oct 9, 2018
@whitehatsec shared
A career as a cybersecurity specialist requires more than just technical skills. It also takes special personality traits. Read more: https://t.co/HaqFmaw71H via @TechRepublic https://t.co/kCWdBV1ECr
Open

10 signs you aren't cut out to be a cybersecurity specialist

A career as a cybersecurity specialist requires more than just technical skills. Cybersecurity professionals also tend to have specific personalities. Do you qualify?

2019 Best Tech Startups in Irvine

On Oct 11, 2018
@cylanceinc shared
We're #1 on @thetechtrib's 2019 Best Tech Startups in Irvine list! Thanks for the feature! #tech #startups #irvine #cybersecurity #AI https://t.co/N8psCEUTy1 https://t.co/qjIIhkKkyG
Open

The Tech Tribune staff has compiled the very best tech startups in Irvine, California. In doing our research, we considered several factors including but not limited to: Revenue potential Leadership team Brand/product traction Competitive landscape Additionally, all companies must be ...

thetechtribune.com
On Oct 11, 2018
@cylanceinc shared
We're #1 on @thetechtrib's 2019 Best Tech Startups in Irvine list! Thanks for the feature! #tech #startups #irvine #cybersecurity #AI https://t.co/N8psCEUTy1 https://t.co/qjIIhkKkyG
Open

2019 Best Tech Startups in Irvine

The Tech Tribune staff has compiled the very best tech startups in Irvine, California. In doing our research, we considered several factors including but not limited to: Revenue potential ...

Top Influencers

Picture of @cylanceinc

Prevent #cyberattacks with #ArtificialIntelligence. Need support? Contact @CylanceSupport.

Follow 8.9k Followers

Picture of @RSAConference

#RSAC: Helping you stay ahead of an ever-changing #security landscape.

Follow 43.1k Followers

Picture of @RSAsecurity

RSA helps organizations mitigate the risk of operating in a digital world – providing the ability to detect, investigate, & respond to advanced threats.

Follow 99.7k Followers

Picture of @whitehatsec

WhiteHat Security helps prevent website attacks by providing the most complete Web security solution for companies of any size.

Follow 35.1k Followers

Picture of @SANSInstitute

SANS is the most trusted and by far the largest source for computer security, IT and information security training, certification and research in the world.

Follow 89.9k Followers

Picture of @CyberScoopNews

Capitol Hill, Silicon Valley and beyond. News, analysis and commentary from cybersecurity’s cutting edge. A @ScoopNewsGroup property.

Follow 938.0 Followers

Picture of @StaySafeOnline

The National Cyber Security Alliance (NCSA) is a nonprofit that empowers people to use the Internet safely & securely. Co-founder of @STOPTHNKCONNECT campaign.

Follow 39.2k Followers

Picture of @cyberdefensemag

Cyber Defense Magazine - The Premier Source for IT Security and Compliance Information. http://t.co/JrLHX9E64N.

Follow 155.1k Followers

Picture of @kaspersky

Kaspersky Lab is the world’s largest privately held vendor of Internet security solutions for businesses and consumers.

Follow 274.3k Followers

Picture of @BlackHatEvents

The World's Premier Technical Security Conferences

Follow 174.8k Followers

Picture of @threatintel

Symantec Security Response brings you the latest threat intelligence from the IT security world.

Follow 67.5k Followers

Picture of @symantec

Helping companies, governments, and individuals secure their most important data wherever it lives. Need support? Contact @SymantecHelp

Follow 160.4k Followers

Picture of @DarkReading

News and information on IT security, helping information security pros manage the balance between data protection and user access.

Follow 148.0k Followers

Picture of @InfosecurityMag

The only magazine dedicated to the strategy and technology of information security, delivering critical business and technical information for IT professionals.

Follow 138.1k Followers

Picture of @Treadstone71LLC

Intelligence, Cyber Counterintel, intel tradecraft, threat intelligence analysis, training, clandestine Cyber HUMINT, Business and Competitive Intelligence

Follow 943.6k Followers

Picture of @STOPTHNKCONNECT

Official page of STOP. THINK. CONNECT., the global cybersecurity education & awareness campaign. Co-founded by @StaySafeOnline @APWG @cyber.

Follow 29.4k Followers

Picture of @SANSDefense

The Cyber Defense Curriculum @SANS Institute is the definitive source for cyber defense news, updates and events. This is your moment!

Follow 22.0k Followers

Picture of @threatpost

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.

Follow 132.9k Followers

Picture of @FBI

Official Twitter Page of the FBI. If you have a tip, please submit it here: https://t.co/56awXxJrEZ /

Follow 1.9M Followers

Picture of @SCMagazine

The official Twitter feed for all things IT security. Like us on http://t.co/FjXz6RfGEC

Follow 95.7k Followers