Hacking & Cybersecurity

Monthly report: September 2018

This month, The Essentials Report, has curated & analyzed the content published by 174 influencers like RSA Conference and Cylance Inc., discussing hashtags such as #Cybersecurity , #RSAC and #security.
Read our monthly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in September 2018

Global Discussions Across the Web
Topics discussed by the influencers
circles
Popular with our readers

Top Hashtags & Sources

Hashtags our readers care about

Top Mentioned Sources

Best articles in September 2018

Open Web Application Security Project (OWASP) Albany Chapter Meeting 2018

On Sep 10, 2018
@owasp shared
Hello OWASP community! Our OWASP Albany Chapter Meeting will be on Thursday, September 20th, 2018 from 11am-2pm EST at UAlbany Campus Center Room 375. All are welcome to attend! For additional details and registration: https://t.co/eEnXnM2FI1
Open

Confessions of a Recovering Software Developer: Analytical Engines, Parking Tickets and Cybersecurity Welcome to Open Web Application Security Project (OWASP) Albany Chapter's first meeting! OWASP is a worldwide not-for-profit charitable organization focused on improving the security of ...

www.eventbrite.com
On Sep 10, 2018
@owasp shared
Hello OWASP community! Our OWASP Albany Chapter Meeting will be on Thursday, September 20th, 2018 from 11am-2pm EST at UAlbany Campus Center Room 375. All are welcome to attend! For additional details and registration: https://t.co/eEnXnM2FI1
Open

Open Web Application Security Project (OWASP) Albany Chapter Meeting 2018

Confessions of a Recovering Software Developer: Analytical Engines, Parking Tickets and Cybersecurity Welcome to Open Web Application Security Project (OWASP) Albany Chapter's first ...

Trump and Peekaboo: Hackers Target Political Malware, Surveillance Software

On Sep 29, 2018
@McAfee_Labs shared
Barack Obama, the 44th President of the United States and the name of a new #ransomware. This malware attempts to stop anti-malware products and mine for cryptocurrency. Details via @JessicaHrdcstle of @sdxcentral. https://t.co/zzvx541YVq
Open

Malware named after Donald Trump and Peekaboo, a zero-day vulnerability discovered by Tenable, pose new security risks to companies.

www.sdxcentral.com
On Sep 29, 2018
@McAfee_Labs shared
Barack Obama, the 44th President of the United States and the name of a new #ransomware. This malware attempts to stop anti-malware products and mine for cryptocurrency. Details via @JessicaHrdcstle of @sdxcentral. https://t.co/zzvx541YVq
Open

Trump and Peekaboo: Hackers Target Political Malware, Surveillance Software

Malware named after Donald Trump and Peekaboo, a zero-day vulnerability discovered by Tenable, pose new security risks to companies.

Why Automation Will Free Security Pros to Do What They Do Best

On Aug 31, 2018
@DarkReading shared
Why Automation Will Free Security Pros to Do What They Do Best https://t.co/1Fm51RnOnj #automation by @RoyKatmor
Open

There are three reasons today's security talent pool is neither scalable nor effective in addressing the rapid evolution of cyberattacks.

www.darkreading.com
On Aug 31, 2018
@DarkReading shared
Why Automation Will Free Security Pros to Do What They Do Best https://t.co/1Fm51RnOnj #automation by @RoyKatmor
Open

Why Automation Will Free Security Pros to Do What They Do Best

There are three reasons today's security talent pool is neither scalable nor effective in addressing the rapid evolution of cyberattacks.

How to achieve autonomous (and optimized) hunting and detection

On Sep 12, 2018
@SANSInstitute shared
9/13 @ 10:30AM ET: @SecBI webcast 'How to Achieve Autonomous (& Optimized) Hunting & Detection' @mbromileyDFIR @sansforensics | https://t.co/V7gZA7iN1D
Open

Network traffic analysis provides the best visibility and coverage of the possible attack surface, and remote attacker dwell environment. It is extremely hard to analyze this data as it is extremely large, ever-changing, and represents servers, laptops, smart appliances, IoT, and ...

www.sans.org
On Sep 12, 2018
@SANSInstitute shared
9/13 @ 10:30AM ET: @SecBI webcast 'How to Achieve Autonomous (& Optimized) Hunting & Detection' @mbromileyDFIR @sansforensics | https://t.co/V7gZA7iN1D
Open

How to achieve autonomous (and optimized) hunting and detection

Network traffic analysis provides the best visibility and coverage of the possible attack surface, and remote attacker dwell environment. It is extremely hard to analyze this data as it is ...

5 states will vote without paper ballots; experts want that to change

On Sep 22, 2018
@McAfee_Business shared
With growing concerns over election interference, experts are calling for paper results. @SteveGrobman and others share their insight with @c_good of @ABC. https://t.co/7VYpoFEysw https://t.co/jaWtL2Ihwd
Open

When voters go to the polls in five states, a verified paper trail will not follow them.

abcnews.go.com
On Sep 22, 2018
@McAfee_Business shared
With growing concerns over election interference, experts are calling for paper results. @SteveGrobman and others share their insight with @c_good of @ABC. https://t.co/7VYpoFEysw https://t.co/jaWtL2Ihwd
Open

5 states will vote without paper ballots; experts want that to change

When voters go to the polls in five states, a verified paper trail will not follow them.

Symantec CIO: 10 Tips for Leading Amid Transformation

On Sep 7, 2018
@symantec shared
Don’t miss this @WSJ article featuring our CIO and Senior VP @SheilaJordan90 giving 10 tips on how CIO’s can shine during organization transitions. https://t.co/yt6s2BRFdh
Open

Symantec CIO Sheila Jordan has helped lead the cybersecurity giant through a series of large acquisitions and divestitures, reducing costs and improving IT service quality along the way. ...

deloitte.wsj.com
On Sep 7, 2018
@symantec shared
Don’t miss this @WSJ article featuring our CIO and Senior VP @SheilaJordan90 giving 10 tips on how CIO’s can shine during organization transitions. https://t.co/yt6s2BRFdh
Open

Symantec CIO: 10 Tips for Leading Amid Transformation

Symantec CIO Sheila Jordan has helped lead the cybersecurity giant through a series of large acquisitions and divestitures, reducing costs and improving IT service quality along the way. ...

4 ways to avoid cloud outages and improve system performance

On Sep 6, 2018
@NetworkWorld shared
RT @PDuhaze: The internet is a volatile place. Fortunately, there are still ways to guard against the possibility of unplanned downtime and avoid cloud outages. Kyle York lists 4 of them here:@NetworkWorld @kyork20 #internet #cloudsecurity #cloud https://t.co/cmkRgQ4oJd https://t.co/sAUiOPE9LV
Open

Cloud providers can fall victim to outages just like anyone else. Here are some straightforward steps you can take to keep IT systems up, running and secure.

www.networkworld.com
On Sep 6, 2018
@NetworkWorld shared
RT @PDuhaze: The internet is a volatile place. Fortunately, there are still ways to guard against the possibility of unplanned downtime and avoid cloud outages. Kyle York lists 4 of them here:@NetworkWorld @kyork20 #internet #cloudsecurity #cloud https://t.co/cmkRgQ4oJd https://t.co/sAUiOPE9LV
Open

4 ways to avoid cloud outages and improve system performance

Cloud providers can fall victim to outages just like anyone else. Here are some straightforward steps you can take to keep IT systems up, running and secure.

Why you should be fed up with the cycle of FUD

On Sep 22, 2018
@CyberScoopNews shared
Why you should be fed up with the cycle of FUD https://t.co/Yr0XceWAOL
Open

Op-ed: The market telling election vendors and political campaigns it has the answers to its security problems is bogus. The truth is, these problems aren't all that novel.

www.cyberscoop.com
On Sep 22, 2018
@CyberScoopNews shared
Why you should be fed up with the cycle of FUD https://t.co/Yr0XceWAOL
Open

Why you should be fed up with the cycle of FUD

Op-ed: The market telling election vendors and political campaigns it has the answers to its security problems is bogus. The truth is, these problems aren't all that novel.

Top Influencers

Picture of @RSAConference

#RSAC: Helping you stay ahead of an ever-changing #security landscape.

Follow 43.1k Followers

Picture of @cylanceinc

Prevent #cyberattacks with #ArtificialIntelligence. Need support? Contact @CylanceSupport.

Follow 8.9k Followers

Picture of @SANSInstitute

SANS is the most trusted and by far the largest source for computer security, IT and information security training, certification and research in the world.

Follow 89.9k Followers

Picture of @symantec

Helping companies, governments, and individuals secure their most important data wherever it lives. Need support? Contact @SymantecHelp

Follow 160.4k Followers

Picture of @WIRED

WIRED is where tomorrow is realized.

Follow 8.4M Followers

Picture of @AccentureSecure

Intelligence and insights to increase security effectiveness and improve business resilience. https://t.co/9dfUu8mIMs

Follow 12.5k Followers

Picture of @DarkReading

News and information on IT security, helping information security pros manage the balance between data protection and user access.

Follow 148.0k Followers

Picture of @CyberScoopNews

Capitol Hill, Silicon Valley and beyond. News, analysis and commentary from cybersecurity’s cutting edge. A @ScoopNewsGroup property.

Follow 938.0 Followers

Picture of @McAfee_Labs

The official tweets of McAfee Labs. McAfee is now part of @IntelSecurity.

Follow 75.4k Followers

Picture of @InfosecurityMag

The only magazine dedicated to the strategy and technology of information security, delivering critical business and technical information for IT professionals.

Follow 138.1k Followers

Picture of @a_greenberg

I'm a reporter for Wired and the author of This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information.

Follow 36.5k Followers

Picture of @SINETconnection

SINET Mission: Advance innovation and enable global collaboration between the public and private sectors to defeat Cybersecurity threats

Follow 1.9k Followers

Picture of @RSAsecurity

RSA helps organizations mitigate the risk of operating in a digital world – providing the ability to detect, investigate, & respond to advanced threats.

Follow 99.7k Followers

Picture of @owasp

Our mission is to make application security visible so that people and organizations can make informed decisions about application security risk.

Follow 76.8k Followers

Picture of @InsideCyber

Daily news and analysis of federal policies and standards to protect data and networks. #cybersecurity

Follow 2.1k Followers

Picture of @SteveGrobman

Passionate about defending the good people of earth against the #cybersecurity threats of today and tomorrow with @IntelSecurity

Follow 970.0 Followers

Picture of @IntelSec_Biz

@IntelSecurity news and resources on solutions for your small business or enterprise. #SecChat organizer/moderator.

Follow 44.3k Followers

Picture of @whitehatsec

WhiteHat Security helps prevent website attacks by providing the most complete Web security solution for companies of any size.

Follow 35.1k Followers

Picture of @NetworkWorld

The Connected Enterprise. Network World, from IDG, is the premier provider of news, intelligence and insight for network and IT executives.

Follow 102.2k Followers

Picture of @WeldPond

Co-founder, CTO of Veracode. Former L0pht security researcher, developer of L0phtCrack and Netcat for Windows. Reaping negative entropy. #appsec #devsecops

Follow 35.6k Followers