Low-code development is definitely fun - until a security incident occurs. Tripwire just published my new blog about the risks the prevail in such ecosystems, and actionable ways to mitigate them. tripwire.com/state-of-secur…
In case you're wondering how a harmless-looking QR code can become a cybersecuirty risk when handled without due cautions, find out by reading my latest article that went live on on the CSA Blog. cloudsecurityalliance.org/blog/2025/07/3…
SC Media just posted my new column about CDN integration for web application security, on top of traditional DDoS mitigation and UX improvements. scworld.com/perspective/fo…
With personal data anonymization being increasingly challenging, the zero-trace paradigm appears to show a lot of promise. Learn more in my new article. dzone.com/articles/zero-…
Underestimating the role of WAFs can be risky business for financial services. In my new blog for Tripwire, I explain the whys and wherefores: tripwire.com/state-of-secur…
Few people realize the risks that may lurk behind the facade of a nifty-looking QR code, an element of everyday customer journeys. So it's time to rethink the blind trust and add a little bit of caution to the mix. secureworld.io/industry-news/…
A doxxing attack can have organization-wide repercussions when a C-suite executive is the target. My new article on Benzinga gives you the lowdown on the logic of this foul play and the ways to reduce risk. benzinga.com/opinion/25/06/…
Even with revolutionary tools in its portfolio, a cybersecurity vendor isn't likely to thrive unless an effective marketing strategy is in place to reach potential customers, in particular the minds of the people who make decisions. benzinga.com/opinion/25/05/…
Corporate decision makers often downplay the importance of minimizing the org's online footprint to raise the bar for phishers - in my new article on CSA, I look at how it all overlaps. cloudsecurityalliance.org/blog/2025/05/2…
If you're staying in the know about social engineering trends, check out my new article on Tripwire that gives you the lowdown on the rising scourge of vishing. tripwire.com/state-of-secur…
Today, there's no "equals" sign between a cybersecurity vendor's tech IQ and business success unless proper media coverage steps in. In my new write-up for SecureWorld, I cover some considerations to bridge the gap. secureworld.io/industry-news/…
Turning a blind eye to threat intel is a bad idea from an enterprise security perspective. In my latest article for the amazing SecureWorld News, I explain why and highlight the ways to do it right. secureworld.io/industry-news/…
CSA just published my new article covering recommendations for companies to make the employee offboarding process frictionless in terms of data privacy. Read this if the subject piques your interest. cloudsecurityalliance.org/blog/2025/04/0…
In my new research, I touch upon nuances of generative AI's train of thought when it comes to solving complex tasks thrown at it: unite.ai/how-well-can-l…
Overconfidence in the Mac's built-in protection can do your org a major disservice, so make sure your IT know these 5 macOS security gaps and close them proactively. Read more in my new column: scworld.com/perspective/ta…
In a new article I wrote for Unite.AI, I share a catch-all overview of the privacy risks stemming from Generative AI, as well as the applicable solutions to address those concerns: unite.ai/is-there-a-cle…
The web browser is a gateway to productivity - and to security issues. In my new column on SC Media, I look at how AI can help tackle today's browser-borne threats: scworld.com/perspective/se…
In a new write-up for SecureWorld News, I reiterated the organizational risks stemming from network attacks and highlighted present-day strategies to fend them off. secureworld.io/industry-news/…
Web accessibility today isn't just a usability matter; it's increasingly also about the security and privacy of millions of people with disabilities. Read more on the remarkable SecureWorld News: secureworld.io/industry-news/…
In a blog I wrote for the amazing Information Security Buzz, I focus on oft-overlooked pitfalls of integrating LLMs with corporate databases as organizations rush headlong into GenAI: informationsecuritybuzz.com/connecting-an-…
305 Followers 3K FollowingAbove all, watch with glittering eyes the whole world around you because the greatest secrets are always hidden in the most unlikely places.
- Roald Dahl
30 Followers 734 FollowingWorldwide Databases & Documents Breaches and Leaks intelligence platform for Cyber Security professionals.
We do not endorse or promote any illegal activities.
194 Followers 285 FollowingI was born and raised in Michigan, but I have been a Nebraska fan since I started watching football. #GBR #Huskers #ChiefsKingdom
276 Followers 6K FollowingIntelligence Architect | IA |
Philanthropist | Quantum AI Technologist
Engineering Intelligence & Capital to Power Africa’s Rise. 🚀
744 Followers 1K FollowingBora is where IT Security marketing professionals come to improve brand awareness and drive high-quality leads.
https://t.co/pYKTNUgyOC
3K Followers 3K FollowingSpecops Software is the leading provider of enterprise password management and authentication solutions. We block weak passwords and secure user authentication.
5K Followers 4K FollowingConnecting, informing, and developing leaders in cybersecurity. Hosting 15 regional conferences. Subscribe for webinars, news & analysis of the InfoSec field.
871 Followers 2K FollowingPublic Relations | Account Director at fama PR 💻| BostonPRGirl ✍️ | #QUAlum 🐯 | views are my own | be kind 🐘 [email protected]
4 Followers 59 Followingআসসালামু আলাইকুম আমি একজন প্রবাসী মালয়েশিয়া থাকি আমার বাড়ি ভেদরগঞ্জ
এই চ্যানেলের মাধ্যমে দেখা যাবে প্রকৃতি জগতের মন মুগ্ধকর পোস্ট
সাথে থাকা জন্য ধন্যবাদ।
26 Followers 574 FollowingWake me when we get there. Used to wear a suit & tie to the office working InfoSec. Now, teeshirt and shorts, sitting in the basement. Full circle.
28 Followers 92 FollowingIndependent reviews, articles and guides to protect your digital privacy and internet usage. #Privacy #CyberSecurity #Encryption #VPN #Streaming #Tech
868 Followers 1K FollowingAt Index Engines, we are the experts in Cyber Resiliency, helping organizations build an infrastructure where trusted data is available and reliable.
296 Followers 526 Following🖥 The best independent VPN Reviews 🎥 Unblock + Stream TV & Movies 🌍 Browse the web in total privacy 💵 Exclusive deals from the best VPN services
10K Followers 840 FollowingIlluminating the intersection of physical and cyber security by providing independent and timely industry news, Op-Ed, and Politics.
166 Followers 1K FollowingUniting Tech and Privacy. Get Paranoid.
Paranoid Home is an add-on device that stops your smart speaker from constantly eavesdropping.
172 Followers 4K FollowingData Analyst @uakron | Alumni at @Northeastern | Movies & TV shows fanatic
Host of Recommendation Pod https://t.co/JSvsoBcQiB…
318K Followers 74 FollowingKaspersky is the world’s largest privately held vendor of Internet security solutions for businesses and consumers. For support https://t.co/enRPRUIwcm
60K Followers 1K FollowingSecurity information portal, testing and certification body.
Organisers of the annual Virus Bulletin conference. @[email protected]
195K Followers 14K FollowingWe help professionals acquire the skills, knowledge and certificates by teaching defense through offense to advance their careers in cybersecurity.
5K Followers 4K FollowingConnecting, informing, and developing leaders in cybersecurity. Hosting 15 regional conferences. Subscribe for webinars, news & analysis of the InfoSec field.
3K Followers 3K FollowingSpecops Software is the leading provider of enterprise password management and authentication solutions. We block weak passwords and secure user authentication.
5K Followers 2K FollowingEditor at @InfosecurityMag 👩💻
B2B journalist/editor for over a decade, started off in defence and now covering cybersecurity. DMs are open.
9K Followers 305 FollowingCybersecurity & Technology, Hacker, Father.
Today: Chief Hacker at EY IL.
ex-Mercedes-Benz, ex-IBM, ex-IDF.
On LinkedIn, Mastodon and Bluesky as well.
2K Followers 975 FollowingMicrosoft WW Regional Security Program Manager Leader. Fighting Cyber Crime, protecting customers.
Married father of a Dyslexic son, EV Driver
4K Followers 592 FollowingDamballa monitors networks for threat-related activity. We discover devices under criminal control and how perimeter defenses failed to stop the attack.
2K Followers 133 FollowingDirector FTR - CyberCrime Research for @TrendMicro. Lecturer in Malware Analysis. Expect post ratio of 2:1 riveting & unmissable cybercrime updates / @StarWars
5K Followers 5K FollowingAward-winning technologist. Volunteer. Carer. No longer using X except to criticize Elon Musk and his right-wing extremist friends https://t.co/tsInY1rZre
344 Followers 39 FollowingMalware Geek is an unbiased antivirus and anti-malware research blog that helps users decide what is the best antivirus or anti-malware software for them.
18K Followers 163 FollowingOnline malware repository project created by @Forensication and maintained mostly by bots. On Mastodon at @[email protected]
8K Followers 6K Following#InfoSec professional, husband & father of two (in random order). #BlueTeam #DFIR #APT #CTI #RedTeaming #BSidesZH (RT/Likes ≠ endorsement) 👀➡️#MalwareChallenge
7K Followers 881 FollowingThreat researcher, malware analysis, RE, incident response, with some old school forensics and CTFing. Apologetic ginger. These are my personal opinions