Twitter
Introducing the AI Transformation Playbook! How can your company become good at AI? This 5-step Playbook provides t…
from twitter_favs
22 hours ago
The REAL 2019 Cyber Security Predictions | AlienVault
The REAL 2019 Cyber Security Predictions New blog by featuring predictions about…
from twitter_favs
yesterday
Twitter
The REAL 2019 Cyber Security Predictions New blog by featuring predictions about…
from twitter_favs
yesterday
Twitter
Just because they are called “the basics” doesn’t mean they are easy to implement.

Without the correct structure a…
from twitter_favs
3 days ago
Twitter
Danny has good newsletter taste, though I'd swap his for Cyber Weekly by
from twitter_favs
3 days ago
Google admits Google Plus hit by *another* privacy flaw, speeds up site's closure
Google admits Google Plus hit by *another* privacy flaw, speeds up site's closure
from twitter_favs
3 days ago
Twitter
Google admits Google Plus hit by *another* privacy flaw, speeds up site's closure
from twitter_favs
3 days ago
Twitter
r/t Three years in jail for teenager who spammed out school bomb threats, and made hoax call about hijacked plane…
from twitter_favs
3 days ago
It's hard to fix deadly CIA communications system problem
At the CIA, a fix to communications system that left trail of dead agents remains elusive via
from twitter_favs
3 days ago
Twitter
‘“understanding what people think they want and then translating the value of our product into their terms” is some…
from twitter_favs
3 days ago
Twitter
In a recent survey of smart TV users that my group performed, we found that a plurality believed that laws exist to…
from twitter_favs
3 days ago
Twitter
"Risk management should be about taking advised risks, and know what your outstanding risk debt is. It's about know…
from twitter_favs
4 days ago
Twitter
It was also linked at the top of mine. I should go back through and put more links in thoug…
from twitter
5 days ago
Twitter
Yep - it is just the game isn't it. We need to iterate our processes just like we iterate our product…
from twitter_favs
5 days ago
Twitter
🤦🏻‍♂️ why didn’t I think of that. That’s exactly it. We’ve moved past that language now and we need better…
from twitter
5 days ago
Twitter
Based on 's piece on Medium yesterday, I wrote some more on Alpha through Live, comments and disagreements…
from twitter
5 days ago
Twitter
Yeah, I don’t agree. During alpha you aren’t building an MVP at all. You are building prototypes. Pr…
from twitter
5 days ago
Twitter
This is why a good feature flag system is such a crucial investment - once you have feature flags it becomes simple…
from twitter_favs
5 days ago
Twitter
Love this from Cyberweekly - "We need to remember that risk is acceptable. Organisations succeed and…
from twitter_favs
6 days ago
Kubernetes being hijacked worldwide
Many Kubernetes clusters are having their Pods hijacked to mine cryptocurrencies
from twitter_favs
6 days ago
Twitter
Australia’s new law might allow police to order engineers to program surveillance features into software behind the…
from twitter_favs
6 days ago
Twitter
GCHQ sends out alert about O365 supply-chain compromises

PDF:
from twitter_favs
6 days ago
Twitter
SSH server binaries customized and deployed as implants is an emerging and evolving attacker TTP. Accordingly, plai…
from twitter_favs
7 days ago
Twitter
The interesting thing to do would be to open source the engine and see if it konquers the konqueror (chrome is chro…
from twitter_favs
9 days ago
Twitter
Awesome post on Advent of code and python, Advent of Code is ultra fun btw really has me thinking and reminding me…
from twitter_favs
10 days ago
Twitter
Imposter Syndrome in a tweet.
from twitter_favs
10 days ago
Twitter
Someone just retweeted a thing and I was "YES that is a strong tweet I should share it with all my - wait, it's a r…
from twitter_favs
10 days ago
Twitter
😂 - The subtitle does say "An almost useless implementation of OTP", which I hope is self-awareness.
O…
from twitter
10 days ago
Twitter
STUPID CRYPTO IDEA OF THE WEEK:
from twitter_favs
10 days ago
Getting started in programming with Advent of Code and Python
I wrote about getting started in programming with Advent of Code and Python. Hope someone finds it useful.
from twitter
10 days ago
Twitter
Yeah. The general concept of “if you don’t patch, you are the problem” ignores the fact that patching i…
from twitter
12 days ago
Twitter
Indeed. Although from memory, WannaCry didn’t actually execute on Windows XP properly so those were far…
from twitter
12 days ago
Twitter
And patching.
Patching fast is important. But it might not be the most important thing in your estate. Don’t fetis…
from twitter
13 days ago
Twitter
I guess I should follow up.
Perry says to stop cargo culting practices like password complexity, and he’s right, b…
from twitter
13 days ago
Twitter
In 1736 the mathematician Leonhard Euler was trying to find a way to cross every single one of the seven bridges of…
from twitter_favs
13 days ago
Twitter
This thread. I don’t agree with every single point in here, but in general this is a lot more right than wrong, do…
from twitter
13 days ago
Twitter
Right up there on my list of great things about having a teen. No more soft pl…
from twitter_favs
13 days ago
Twitter
Yeah somewhat after the noise and the lady who once came to me to explain one of my boys had…
from twitter
13 days ago
Twitter
That was one of the submissions. I was so upset when I read it. Whatever ones perspective on GDS managemen…
from twitter
13 days ago
Twitter
"Attacking the "lack of testosterone" of the current leadership of GDS for not being "chest beating enough" is horr…
from twitter_favs
13 days ago
Twitter
Data breaches matter and we should handle data responsibly, and long term regulators may have a financial impact. B…
from twitter_favs
13 days ago
Twitter
Roughly agree. The general interface is too hard.
There’s an interesting concept of “customised voice”…
from twitter
13 days ago
Twitter
This is an interesting question, I asked him (8 years old) and he said no because an AI is a robot and t…
from twitter
13 days ago
Twitter
Thing 2 wants to play “would you ever?” Where he’s asking difficult questions.
Him: “would you kill yourself to sa…
from twitter
13 days ago
Twitter
Re not being easy, would you really want account recovery to be facilitated by proving images of a number plate and…
from twitter_favs
13 days ago
Twitter
I can take an educated guess at the root cause of the account takeovers, but this piece is still really interesting…
from twitter_favs
13 days ago
Twitter
Also that your encryption algorithm doesn’t age the way crypt, md5, des and others have. How long will the…
from twitter
15 days ago
Twitter
Recommended read - by - This should be on all peoplez shelf. Cc…
from twitter_favs
20 days ago
Twitter
Worth reading, as always, specially the piece and Michael's thoughts around it...
from twitter_favs
20 days ago
Untitled (https://www.cnbc.com/2018/11/23/russia-stung-by-intelligence-leaks-plans-to-tighten-data-protection.html)
Russian intelligence tries to solve its Bellingcat problems with new law targeting database leaks
from twitter_favs
20 days ago
Twitter
The servers are down and twitter is already full of freezing people not able to control their heating :D (…
from twitter_favs
21 days ago
Twitter
Sure. I think the obsession with job titles matching the new culture is nonsense. See…
from twitter
23 days ago
Twitter
I’m supporting a Threat Modeling workshop at ThoughtWorks tomorrow night with and there are sti…
from twitter_favs
23 days ago
Twitter
I also missed that meeting. But I made some later ones and instead of changing the ex…
from twitter
23 days ago
Twitter
Bonjour you can read it here: Thread by : "Mini-Thread: AWS Auto-Scaling adding support for p…
from twitter_favs
23 days ago
New – Predictive Scaling for EC2, Powered by Machine Learning | AWS News Blog
Mini-Thread: AWS Auto-Scaling adding support for predictive scaling today.
from twitter_favs
23 days ago
Twitter
Words matter and by hiring "a DevOps" you, as a company, are signalling that somewhere within your org structure th…
from twitter_favs
24 days ago
5 Ways Smart People Sabotage Their Success
I've definitely seen some of these in my career, this list resonated with me.

from twitter_favs
24 days ago
Twitter
I'm not a huge fan of certification. I don't think anyone agrees what "DevOps" really is. But you know what - the s…
from twitter_favs
25 days ago
Twitter
Thanks! I have just hot 700 :)

Which is nice as I sent your newsletter to a couple of people this we…
from twitter_favs
27 days ago
Twitter
Subscribe here: . (The website really should have a sub…
from twitter
27 days ago
Twitter
Yes that's a terrible website, yes I keep meaning to do something about it, no I don't have the free time to make i…
from twitter
27 days ago
Twitter
Some issues sending this weeks newsletter, I hit send 2 hours ago and it still hasn't gone out. You can see the co…
from twitter
27 days ago
Twitter
As we finish another week at I'm incredibly grateful for:

- fantastic people making things happen…
from twitter_favs
27 days ago
Twitter
To validate that I’d want to know:
- different, smaller group of staff administer the subsystem
- breac…
from twitter
28 days ago
Twitter
I might vary this in production for vastly different risk profiles. I.e. if my service is a big online s…
from twitter
28 days ago
Twitter
Very excited to have completed my first day as a permy . Thanks to all the lovely people who’ve supporte…
from twitter_favs
29 days ago
Twitter
I’ve always understood it as envy wants what it doesn’t have. Jealousy doesn’t want others to have w…
from twitter
4 weeks ago
Twitter
I’d probably just say “doing this can be massively hard. Recognise this”
Legacy orgs…
from twitter
4 weeks ago
« earlier      
#aws #bbcstrikes #bcl8 #cablegate #confs2011 #esc #fullfrontalconf #girlgeek #girlsinit #gmp24 #hhhmcr #java #kindle #lsug #mashableawards #mubarak #route53 #scala #scalecamp #today #uksnow #wikileaks #win #xfactor #yatw #yummy 0day 2factor academia adacdemia ads advice agile agit ai alevels analysis analytics android api appengine. apple apprentice apps appsforkids aprilfool architecture assange attack attacks attention attitude automated automation aws backlog backup badmath banking bashrc bbc bbcstrikes bcl8 beginner bigdata blockchain blog blogging book boostrap bootstrap brands breach breakdown browser browsers build business cablegate cdn chrome cio ciso closing cloud cms code codeofconduct coffeescript comment communications competition compute computing conferences confs2011 container containers contentapi criticism crypto css cto culture cyber cybersecurity cyberweakly cyberweekly darkmarkets dashboards data database datascience dependencies deployment design desktop detection developers development devnest devnestsf devops devsecops diagrams digitalcurrency diversity djugl dns docker documentation ebook ec2 ecosystem editors education election email empathy engineering englandriots esc etsy eurocrisis exploit faas facts fail fanservice feedback fiction flash flot fluidinfo fraud freeapps freemacbook frictionless fullfrontalconf functional funny future futurist game gamedev gameover games gamesdev gaming gdndi gdpr gds gdstecharch gender girlgeek girlsinit glancables glass glitch gmp24 go golang google googleio government graph graphing graphs growing gu_tech guardian guide gyford habits hackday hacking happy hardware haystack hhhmcr hiring history hosting howto hpwebos html html5 hypermedia ide ideas identification ie6 immutable incident individuals infrastructure injustice innovation insider insiders inspiration installation interviewing interviews intro ios iot ipad it itsy java java8 javascript jccc2 jenkins journalism jquery js json jvm kanban kindle lambda languages launch learning leveson liberties library lift links lists loadbalancer local log4j logging logs longreads lovewins lsug machinelearning mail maintainability malware management manager markdown marketing mashableawards math maturity maven mechanicalturk media medium meetings metrics microservices migration ministers minutes mobile mongodb mongouk monitoring mooc mtg mubarak mvp naming nasa nerd networking news newsletter nickleggsfault no2av node.js oas oauth oexchange online opensource oracle organisation osx outage paas paper paradigm parliament pass passion passwords payments performance phishing pipeline poc policy politics pos pr priorities prism privacy process product programming protocol prototyping psychology publisher push puzzle python quality rant readingthe readlater redesign reference regex registry report research resource responsive rest rights risk route53 rpg ruby saas safety sbt scala scalaz scalecamp scalesummit scaling science scrum security securityengineering sensible seo sequence serverless sexism sidechannel simple singles smartthings social socialmedia source spam speakers sql ssd ssl standards startup startupbritain startups stateactor statics statistics stats status storytime strategy stream study success superiority suppllychain switch switches team teams testing text textual threat threatmodel threatmodelling threats thrift timezones today todayguardian todo tool tools training transform transformation trello trust tutorial tweet twitter u2f ui uksnow uml unikernels usage user-centered-security userrespect ux vagrant vi via:popular video videos virtualisation visa vision visualisation visualise vpn warnings web webapps webdev webops webservices well-known whois wikileaks win wordpress writing xfactor xrd xss yatw yes2av youngrewiredstate yrs2011 yummy zeus

Copy this bookmark:



description:


tags: