Twitter | Search | |
Ed Bellis
Founder & CTO of . Recovering CISO @ Orbitz. Member of Forbes Technology Council.
10,736
Tweets
1,360
Following
4,250
Followers
Tweets
Ed Bellis 5h
Interesting writeup of using various container vulnerability scanners with varying results by
Reply Retweet Like
Ed Bellis 6h
Asset Risk In 3 Short Videos (and 1 Long One). Where & I discuss some of the findings from our most recent joint research.
Reply Retweet Like
Ed Bellis Jul 1
Replying to @mroytman @DTMellinger
“stopped”
Reply Retweet Like
Ed Bellis Jul 1
Replying to @mroytman @DTMellinger
wait... am I a millennial now?
Reply Retweet Like
Ed Bellis Jul 1
And somewhat related... gives us a brief history of Security Metrics:
Reply Retweet Like
Ed Bellis Jul 1
Episode 3 of Security Science where & discuss the components of security risk:
Reply Retweet Like
Ed Bellis Jun 30
Congrats to and the team at Hunters.
Reply Retweet Like
Ed Bellis retweeted
David F. Severski Jun 30
And...we're live! for a sample of what subscribers () received this morning!
Reply Retweet Like
Ed Bellis Jun 29
GitHub - maxgoedjen/secretive: Store SSH keys in the Secure Enclave
Reply Retweet Like
Ed Bellis retweeted
gskouby Jun 28
This new podcast is worth adding to the regular rotation.
Reply Retweet Like
Ed Bellis Jun 26
My daughter got ’s number. Safe to say she’s in a glass case of emotion.
Reply Retweet Like
Ed Bellis Jun 26
OH “Pretty soon downtown is just going to be nursing homes and coffee shops.”
Reply Retweet Like
Ed Bellis Jun 25
Replying to @jeremiahg
That’s great to hear!
Reply Retweet Like
Ed Bellis Jun 25
Replying to @jdoss @RealAndyGeorge
Gotta use !
Reply Retweet Like
Ed Bellis Jun 25
Replying to @liztormato @jdoss
This easily goes down as the best news I’ve heard in 2020.
Reply Retweet Like
Ed Bellis Jun 25
Replying to @b4b027
Information wants to be free!
Reply Retweet Like
Ed Bellis Jun 25
Replying to @jdoss
You can’t just skip Perl 6!
Reply Retweet Like
Ed Bellis retweeted
Rich Mogull Jun 25
Replying to @ebellis @DisruptOPS
And not to get vendor-y, but this is pretty much the basics of what does (plus more).
Reply Retweet Like
Ed Bellis Jun 25
How Uber Continuously Monitors the Security of its AWS Environment
Reply Retweet Like
Ed Bellis Jun 25
Say Hello to the Security Science Podcast
Reply Retweet Like