Twitter | Search | |
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ
Exploring the interesting and beautiful at the intersection of security, technology, and humans.
14,905
Tweets
297
Following
75,141
Followers
Tweets
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ retweeted
Richard Bejtlich 13h
I really like these time-centric metrics. We want "actionable" intel, and this is reporting you can't deny. Can you detect & respond in less than 19 mins? You can argue some intruders go slower on purpose, which may be true, but this research sets a time goal for fast intruders.
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ 8h
Replying to @wimremes
I don’t think this means what you think it means.
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ 10h
Replying to @lennyzeltser
Thank you!
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ 13h
Replying to @codeook
Hi! It’s just now! Thanks!
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ retweeted
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ Nov 28
Boomer: “I don’t care if you can predict horrible diseases using genetic sequencing, cuz you’re not getting a drop of data from me regardless of benefit!” GenZ: “I’ll give Starbucks my entire genome for a discounted latte”. Two viewpoints, but only one is building the future.
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ Feb 18
Great idea, thanks.
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ Feb 18
It's not working because we're not advanced enough to be boring. We still have lots of silliness and magic left, for better or worse. : )
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ Feb 17
You asked if there was a checklist for doing security well. That's what CIS20 is pretty good at, is all I'm saying.
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ Feb 17
When data breaches, leaks, and compromises take place—or even worse—the changing or removing of critical services, those affect many people at once with similar implications as airline security. Is the CIS 20 not an example of a good checklist?
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ Feb 17
Replying to @benedictevans
Yeah I think there are only room for a few since they push. So they get annoying quick.
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ Feb 17
I think she meant 30 books per subject.
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ Feb 17
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ Feb 17
A human wrote the top part, and an AI wrote the story to go with it—on it's second try.
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ Feb 17
Agreed, but that just means there are kinks in the trend, not that it doesn't exist.
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ Feb 17
Exactly.
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ retweeted
Andrew Shvarts Feb 16
Twitter is wild because the dumbest people are like “Mayhaps you have slandered me with that ad hominem” and the smartest people are like “my dog is a chonky boi”
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ Feb 17
Can you show me an effective flight checklist? And if you can, is there a reason that a similar thing wouldn’t be useful in infosec? Say the CIS 20?
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ retweeted
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ Feb 17
How corporations will soon become our universal and subscription-based providers of everything from education to healthcare.
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ Feb 17
Can you define those two things for me?
Reply Retweet Like
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ Feb 17
How corporations will soon become our universal and subscription-based providers of everything from education to healthcare.
Reply Retweet Like