|
wbtsec
@
wbtsec
Winnipeg, MB
|
|
.#cybersec enthusiast. news ghoul. open source intelligence. social engineer. small blog at phishy.website
|
|
|
148
Tweetovi
|
1.955
Pratim
|
3.244
Osobe koje vas prate
|
| Tweetovi |
|
wbtsec
@wbtsec
|
11 h |
|
NIST Key Practices in Cyber Supply Chain Risk Management: Observations from Industry
pdf - nvlpubs.nist.gov/nistpubs/ir/20…
|
||
|
|
||
|
wbtsec
@wbtsec
|
11 h |
|
New cyber supply chain risk management guidance from NIST provides organizations with case studies and standards designed to build an effective enterprise program
healthitsecurity.com/news/nist-shar…
|
||
|
|
||
|
wbtsec
@wbtsec
|
12 h |
|
To date, the hackers’ targets have been patient medical records and other sensitive data. But it’s inevitable that the frightening hypothetical scenarios of attacks that injure or kill people become reality.
nyotron.com/blog/what-will…
|
||
|
|
||
|
wbtsec
@wbtsec
|
12 h |
|
Pages with the best tools to protect you while using w7 in 2020 is bad news. Windows 10 upgrade is free. Here's how if your ready
windowsreport.com/windows-10-fre…
|
||
|
|
||
|
wbtsec
@wbtsec
|
13 h |
|
No matter how devastating an attack on a Windows PC: the initial response is to attempt a repair. AV-TEST tested 7 security solutions and 4 special tools
av-test.org/en/news/here-a…
|
||
|
|
||
|
wbtsec
@wbtsec
|
13 h |
|
Cisco's survey of attitudes about privacy highlights the emergence of "privacy-active" consumers
pdf - cisco.com/c/dam/en/us/pr…
|
||
|
|
||
|
wbtsec
@wbtsec
|
13 h |
|
This research is to understand the investments that organizations are putting into building and maintaining Security Operations and highlight the barriers that are preventing teams from being effective
ponemon.org/blog/the-econo…
|
||
|
|
||
|
wbtsec
@wbtsec
|
14 h |
|
The Social and Psychological Impact of Cyber-Attacks — Understanding how members of the public perceive and engage with risk and how they are impacted during and after a cyber-attack has occurred
pdf - arxiv.org/ftp/arxiv/pape…
|
||
|
|
||
|
wbtsec
@wbtsec
|
17 h |
|
Cloud computing can quicken U.S. Department of Defense (DOD) efforts toward information dominance, but agencies must be measured and deliberate in the march toward the cloud
afcea.org/content/signal…
|
||
|
|
||
|
wbtsec
@wbtsec
|
17 h |
|
Reports indicate that about 20% of enterprise data is currently cloud-based, a number that will increase leaps and bounds as new cloud-based technologies move into the picture
forbes.com/sites/emilsaye…
|
||
|
|
||
| wbtsec proslijedio/la je tweet | ||
|
Binni Shah
@binitamshah
|
21 h |
|
Turning a hotel key card into a stolen credit card : youtube.com/watch?v=ZDstCH… cc @modernrogueshow
|
||
|
|
||
|
wbtsec
@wbtsec
|
18 h |
|
ty!
|
||
|
|
||
|
wbtsec
@wbtsec
|
18 h |
|
An inside look at the business of cyber threat detection and interdiction
techgenix.com/cyberthreat-de…
|
||
|
|
||
|
wbtsec
@wbtsec
|
21 h |
|
Where are we at if it has come down to voting from your phone? ...
A rotten convenience like that should be banned.
|
||
|
|
||
|
wbtsec
@wbtsec
|
21 h |
|
Many would agree it was just a blurp. Of course.
However, political rabbit holes are vicious. Possibly even a test ;]
|
||
|
|
||
|
wbtsec
@wbtsec
|
21 h |
|
Shadow Inc. responds "process to transmit that caucus results data generated via the app to the IDP was not"
twitter.com/ShadowIncHQ/st…
|
||
|
|
||
|
wbtsec
@wbtsec
|
21 h |
|
Then this happens: A smartphone app purchased by the Iowa Democratic Party for precincts to use to report caucus votes didn't work as planned
npr.org/2020/02/05/802…
|
||
|
|
||
|
wbtsec
@wbtsec
|
21 h |
|
Election manipulation in 2020. Scientists can’t stop it, but they can study it
qz.com/1698845/scient…
|
||
|
|
||
|
wbtsec
@wbtsec
|
21 h |
|
When Iranian-born German academic Erfan Kasraie received an email from The Wall Street Journal requesting an interview, he sensed something was amiss
reuters.com/article/us-ira…
|
||
|
|
||
|
wbtsec
@wbtsec
|
5. velj |
|
The agency took a step in the right direction in January, but it needs to demonstrate that it has truly abandoned the practices that unleashed WannaCry on the world
.#windows
computerworld.com/article/351924…
|
||
|
|
||