Twitter | Search | |
This is the legacy version of twitter.com. We will be shutting it down on 15 December 2020. Please switch to a supported browser or device. You can see a list of supported browsers in our Help Center.
Search Refresh
Andreas Janzen Nov 29
R2/D29-30 in Busy week at work, therefore not much to report. Made some progress with my and book. Today, I wrote a script to scrape a list of free proxies from a website for my proxychains config file. Want to finish that tomorrow.
Reply Retweet Like
Matthew Okafor 3h
Way to go Sandro!! Good man!! 😎
Reply Retweet Like
Sébastien D. Dec 1
I can't wait to share the outline of the book. I'm thrilled with the content I'll be covering. Tons of fun ahead! I'm almost done with the part. It reminds me of all the fun I've had diving into this a few years back. AD, Kerberos, RBAC, ABAC, LDAPS, IAM, OAuth, etc
Reply Retweet Like
Meh Nov 24
People working in what do you like most about your job? Mine is the people I work with. Constantly improving everyday and get to feel like Sherlock Holmes sometimes
Reply Retweet Like
Gayleen Gray (gg) Nov 30
This is great for and for . We are better and more secure when we collaborate and work together. 🇨🇦
Reply Retweet Like
The Miller Group Nov 25
How to create a strong password and remember it.
Reply Retweet Like
PAV i.t services Nov 30
Collecting, preserving and reviewing data has become more challenging. Find out how the increase in remote working has added to the burden of data discovery:
Reply Retweet Like
TU Graz Dec 1
Reply Retweet Like
MeeLock: No More Passwords, very secure and fast Nov 26
Users can authenticate using up to 9 different authentication methods, which makes it highly secure. Our card contains a physically tamper-proof security chip with Common Criteria EAL6+ certification.
Reply Retweet Like
xoss_technology Nov 27
By restricting the control of client certificates and IP ranges in config.XO you can ensure that only clients from your organization are able to register.
Reply Retweet Like
CyberSecurityResource Nov 23
A new analysis of 11 relatively inexpensive video doorbells uncovered high-risk vulnerabilities in all of them.
Reply Retweet Like
Lucid Networks Nov 30
Thanks for asking for our tips on It's been great to be able to share our advice on and staying safe online
Reply Retweet Like
Computer Solutions Nov 29
Compliant? Secure? Find what makes security and compliance different elements for your business.
Reply Retweet Like
Secur3 Nov 26
Reply Retweet Like
Claudette Archer Nov 27
In case you missed the live event, check out our on-demand webcast "Scenes from the New Normal: Cybersecurity in Uncertain Times" featuring  
Reply Retweet Like
Patrice GAILLOT Nov 24
: New Insider preview brings bug fixes and more ahead of Microsoft's December break via &
Reply Retweet Like
sec4dev Nov 26
Get your Ticket for 2021 - all digital! //Conference Talk 24-25.02.21// Session: "So Happy Together: Making the Promise of DevSecOps a Reality" by !
Reply Retweet Like
vigilance_en Nov 26
Vigil@nce of Trend Micro ServerProtect for Linux: buffer overflow. Identifiers: -2020-28575.
Reply Retweet Like
evoila GmbH Nov 25
Secret Management the Easy Way with Aqua CSP! New Blogpost
Reply Retweet Like
Tripwire Dec 1
Jason Parms takes a look at Apple notarization, recent examples of Apple-notarized malware and some prevention techniques.
Reply Retweet Like