techwordnerd's profile picture. Seattleite and infosec industry writer. Bad at high fives, but not for lack of enthusiasm. All opinions are my own.

Carol C

@techwordnerd

Seattleite and infosec industry writer. Bad at high fives, but not for lack of enthusiasm. All opinions are my own.

Carol C reposted

"It’s time #CISOs took a stand. And for me, that means no longer being a CISO. Instead, it means I’m headed to @Uptycs."- @sirjackery Welcome to the #Uptycs team, Jack Roehrig! We're stoked to have you coming on board as our Technology Evangelist. Let's go! 💪 #cybersecurity

uptycs's tweet image. "It’s time #CISOs took a stand. And for me, that means no longer being a CISO. Instead, it means I’m headed to @Uptycs."- @sirjackery 

Welcome to the #Uptycs team, Jack Roehrig! We're stoked to have you coming on board as our Technology Evangelist. Let's go! 💪
#cybersecurity

Carol C reposted

Synk is the name of my IaaS* startup Iceberg as a Service.


Carol C reposted

The Uber hack is quite severe and wide ranging. Wishing their blue teams the best of luck and love during this understandably difficult period. Some thoughts & observations based on what we've seen so far 👉 1/N


Carol C reposted

Boss: How good are you at Power Point? Me: I Excel at it Boss: Was that a Microsoft Office pun? Me: Word


Carol C reposted

I made a VGP (very good program) that makes it so it looks like I’m typing on slack whenever anyone else is typing, and stops when they stop. Everyone loves it so far and doesn’t find it annoying at all! github.com/will/slacktypi…


This talk by @halffinn helped me start to wrap my brain around the many dimensions of cloud security, the tools that exist to cover each, and the ways consolidation is expanding the reach of individual security platforms. youtube.com/watch?v=ogbGLa…


I am figuratively dying 😂

This post is unavailable.

The #RSA acronym mystery has been solved :-D

This post is unavailable.

Carol C reposted

We shine a light into the shadows of ransomware and cybercrime, from the perspectives of the perpetrators and victims. Listen here: bit.ly/3e3Pe8g

Radiolab's tweet image. We shine a light into the shadows of ransomware and cybercrime, from the perspectives of the perpetrators and victims. Listen here: bit.ly/3e3Pe8g

From SUNBURST to Log4j, it's been... a year. Read 100 stats on cybersecurity over the course of 2021. #cybersecurity sprou.tt/1gBIwXyVJ0d


Carol C reposted

Congratulations to the winners of this year’s Advanced Threat Awards! They truly are the Malicious Ones and have earned this year’s top honor -- the Breachy! @MrRansomware @3rdWheelAppeal @CollectinUrInfo #Cybersecurity #Ransomware #AdvThreatAwards xtra.li/3IxgCtj

AdvThreatAwards's tweet image. Congratulations to the winners of this year’s Advanced Threat Awards! 
They truly are the Malicious Ones and have earned this year’s top honor -- the Breachy! @MrRansomware @3rdWheelAppeal @CollectinUrInfo #Cybersecurity #Ransomware #AdvThreatAwards xtra.li/3IxgCtj

#Encryption can be a double-edged sword. Attackers are increasingly hiding their movements within existing encrypted protocols, making decryption a critical capability for security tools. #Cybersecurity sprou.tt/1NQJ38HNM3u


Carol C reposted

How it's going. #HappyHalloween


Generally, encrypting traffic helps improve network security. So how does decrypting traffic also improve network security? @ExtraHop's Jesse Munos explains! #Decryption sprou.tt/1BT0L79Bu4N


Attackers love print servers, these unassuming-yet-well-connected devices are an idyllic host for all sorts of nefarious activities. This blog tells how a security team discovered and stopped beaconing behavior. #Cybersecurity #NDR sprou.tt/19anesnomdv


The latest PrintNightmare vulnerability (CVE-2021-34527) is being actively exploited. Learn what makes this vulnerability to the Print Spooler service different, and what you can do to secure your organization. sprou.tt/1GigslqA1cL


Read the top 3 cybersecurity trends from the @Verizon DBIR to help business leaders and security experts understand what they're up against. sprou.tt/1McezDnKKpI


What are the risks around vulnerable protocols across organizations? A security advisory from @ExtraHop explores why over two-thirds of enterprises are running SMBv1, four years after WannaCry. #cybersecurity #security #ransomware sprou.tt/1RdbZGFZl9v


Interesting WSJ Cybersecurity article today, with @ExtraHop co-founder Raja Mukerji weighing in on the issue of state-backed hackers. sprou.tt/1bnuas4PcDB


Loading...

Something went wrong.


Something went wrong.