Twitter | Search | |
William John Malik
CISA, Information security, privacy, business continuity, IdM, SDLC, joyful surfer of technology trends. 3 kids. MIT '73. Tweets my own.
3,859
Tweets
2,348
Following
778
Followers
Tweets
William John Malik retweeted
Dr. Donna Malayeri comma PhD Feb 14
To prove a point: Please RT if you don't have a CS degree and you have a job in tech.
Reply Retweet Like
William John Malik 3h
Replying to @davidfowl
Ignore all unconstructive criticism.
Reply Retweet Like
William John Malik 24h
Replying to @oscaron
Well, there's two parts to the process: back up and restore. Backup gets you half way there.
Reply Retweet Like
William John Malik retweeted
javascript jesus is watching you! Feb 14
Roses are red Some teams are too Your DLP's weak And VPN let me thru
Reply Retweet Like
William John Malik retweeted
Cara Wainwright Feb 14
Mobile banking & buying can have its pitfalls if you’re not savvy about how & when to use it and under what conditions. So what are these best practices & what tools can you use to enhance your mobile banking security? Answers here: via
Reply Retweet Like
William John Malik retweeted
Trend Micro Feb 14
Containers were designed to improve developer efficiency. Security is a priority for the teams working on projects like that make containers work but there will always be security issues that pop up. Read more about -2019-5736: via
Reply Retweet Like
William John Malik Feb 14
Replying to @TProphet
Once you fix it, you and they can move on.
Reply Retweet Like
William John Malik Feb 13
Replying to @SheSponse
Well, there's this:
Reply Retweet Like
William John Malik retweeted
Andrew Hay Feb 12
INDUSTRY: “There’s a shortage of qualified professionals!” RECRUITER: “Drink these multiple glasses of fire to prove your worthiness. It’s our policy, no exceptions.” ME: “I’m an adult with 20+yrs experience. I’ll look somewhere else, thanks.” RECRUITER: “But…but…free fire.”
Reply Retweet Like
William John Malik Feb 13
Replying to @Harkaway
Arthur Conan Doyle.
Reply Retweet Like
William John Malik Feb 13
Replying to @AppSecBloke
The implant will be much more durable, and won't involve damaging other healthy teeth.
Reply Retweet Like
William John Malik retweeted
Trend Micro Feb 12
This week a new vulnerability was published (-2019-5736) that highlights everything bad & good about containers. Simply put, this can be exploited using an infected container to attack the host. More details here via :
Reply Retweet Like
William John Malik Feb 12
Replying to @chadloder
They go on the couch along with the two or three extra pillows.
Reply Retweet Like
William John Malik Feb 11
Replying to @generativist
Wait - is that authentic vynil aluminum siding? Sweeeeeet!
Reply Retweet Like
William John Malik retweeted
Trend Micro Feb 11
We observed a malicious app stealing credit card information & mining Monero . Details in this report:
Reply Retweet Like
William John Malik Feb 11
Replying to @marcusjcarey
I think oil companies are neat!
Reply Retweet Like
William John Malik Feb 10
Replying to @atrupar
Shhh ... he's rollin.
Reply Retweet Like
William John Malik retweeted
David Crosby Feb 9
The next thing we have to talk sbout is Canadian singing group the O’Pears. 3 ladies who sing spectacularly well together. Vocal magic of extremely high quality
Reply Retweet Like
William John Malik retweeted
InfoSecSherpa Feb 9
“There will be 600 free places on all-female CyberFirst Defenders courses in April and May this year...the venues for the four-day courses will include Nottingham, Lancaster, Wrexham, Edinburgh and Oxfordshire.”
Reply Retweet Like
William John Malik Feb 10
Replying to @StrawberriCurls
Why?
Reply Retweet Like