Twitter | Search | |
This is the legacy version of twitter.com. We will be shutting it down on 15 December 2020. Please switch to a supported browser or device. You can see a list of supported browsers in our Help Center.
Search Refresh
Stormnet Media 25 Jan 14
[Still Want An Phone?] Android Has 99% Of The Mobile ? -
Reply Retweet Like
Cybersecurity in Africa 18 Nov 19
Calling out all African women in ! Submit an article for our upcoming magazine. Hard deadline is Nov 30th at 9pm GMT. For more info, email: editor@cyberinafrica.com
Reply Retweet Like
Joel Scharlat 16 Mar 18
This system is currently deployed as 2,000 onboard systems (!?!) and can transmit via SATCOM. Some good predictive maintenence potential here. I hope they've taken into consideration.
Reply Retweet Like
Commander Quest Aug 21
is so tricky. The university had backups, but attackers can always threaten to make your data public.
Reply Retweet Like
Reason Cybersecurity 5 Nov 15
Talk Talk tries to make nice.
Reply Retweet Like
Yvan Nasr Sep 1
Replying to @certik_io
Happy to consult with any projects out there looking for work !!! Contact our team: bd@certik.io
Reply Retweet Like
Annette Birch 27 Sep 17
Reply Retweet Like
American Automotive Manufacturing 10 Oct 19
hitting the industry is bad enough, but protection is of huge concern! 's blog keeps you up to date on information about , , & more. Learn how here:
Reply Retweet Like
fintech-portal.net 24 Oct 16
Reply Retweet Like
Hiscox 13 Feb 17
How can go from novices to experts? Start w/ the 2017 Hiscox Cyber Readiness Report
Reply Retweet Like
DrReemAlShammari Jun 13
Great sessions, Welldone 👏🏻👏🏻🇰🇼 And the good news the recordings will be uploaded on Youtube soon. Looking forward the uploads .
Reply Retweet Like
Cyber Security Nov 10
scholars join for what promises to be an exciting debate on the impact of and
Reply Retweet Like
Business Roundtable 13 Feb 13
BRT stmt on President’s executive order on Biz needs legal protections to encourage info sharing.
Reply Retweet Like
Steven Wasserman 30 Nov 16
Reply Retweet Like
Bridewell Consulting 15 May 19
Reply Retweet Like
Tom Wright 18 Jul 16
guru Schneier joins Tor Project board along with five other luminaries
Reply Retweet Like
Inspired eLearning 15 Mar 19
Small businesses can be more vulnerable to cyberattacks than larger companies because they often don't have sophisticated and comprehensive systems to protect themselves. Here are six ways you can improve your cybersecurity efforts.
Reply Retweet Like
CyberSecInt 5 Sep 14
10 Biggest Data Breaches: Facts and Lessons l Daniel Solov
Reply Retweet Like
TUJDays 24 May 16
Reply Retweet Like
Christopher Castelli Nov 19
Related: is seeking public comments to update Special Publication (SP) 800-55 Revision 1, Performance Measurement Guide for . Deadline = Dec. 10: |
Reply Retweet Like