Twitter
| ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄|
| CYBER |
| MEANS |
| COMPUTERY |
|___…
from twitter_favs
5 days ago
Twitter
Here's a primer on and , the attackers who attempted to influence the 2016 US presidential election:…
from twitter_favs
6 days ago
Twitter
This isn't exclusively a CS issue - same argument made for businesses, police, forces, etc. Senior civil service ju…
from twitter_favs
6 days ago
Twitter
asks: does the civil service reward the skill of navigating Whitehall itself over understanding policy…
from twitter_favs
7 days ago
Twitter
RT : Here’s how it works. When a user tries to change their password on example․com through the iCloud Keychain UI, Safa…
from twitter_favs
7 days ago
Embracing Agile
I also seem to remember that this, , by Jeff Sutherland one of the creators of Sc…
from twitter
7 days ago
Twitter
I also seem to remember that this, , by Jeff Sutherland one of the creators of Sc…
from twitter
7 days ago
DevOps Research and Assessment
The state of DevOps report, over at with outstanding academic rigour shows that…
from twitter
7 days ago
Twitter
The state of DevOps report, over at with outstanding academic rigour shows that…
from twitter
7 days ago
Twitter
If you’re putting these stats in PowerPoint, press Alt+F4 before you save the presentation.
from twitter_favs
8 days ago
Twitter
With plot twists like this, Netflix should commission a series.
from twitter_favs
8 days ago
Twitter
We built to make sure everyone in the UK can have a truly delightful experience when they bu…
from twitter_favs
9 days ago
Twitter
Sometimes I do and sometimes I don't. I make the decision according to a c…
from twitter_favs
9 days ago
Twitter
So, it’s been 17 weeks of consistently producing a weekly newsletter on cyber security matters. I think it’s safe t…
from twitter
9 days ago
Cyberweekly #17 - How do normal users make good security decisions?
Cyberweekly - How do normal users make good security decisions?
from twitter
9 days ago
Twitter
The unexpected thing that's helped me use my phone less as a random time-filler: a wireless charging pod.

Because…
from twitter_favs
10 days ago
Twitter
There wasn't an age limit, so I entered Olivia in the Tour of Britain warm up laps in Westminster... 🤣
from twitter_favs
11 days ago
Twitter
After no sleep since my tweet on the 20th August about SSH being insecure I can finally sleep, after about 10 email…
from twitter_favs
11 days ago
Twitter
This is the best (and most depressing) view of organisational inn…
from twitter_favs
12 days ago
Twitter
This feels like what happens when a desire to “tell people stuff they can do about staying safe” overrides a genuin…
from twitter_favs
12 days ago
Twitter
Yesterday and I dressed the same. An accident, but entirely appropriate...because when he goes to his n…
from twitter_favs
12 days ago
Twitter
Ironic that many commenters on that story (who I suspect are journos mostly) have done exactly what…
from twitter
12 days ago
Twitter
Daughter: What does gays mean?
Me: Well you know mum and dad love each other - two men can love each other the same…
from twitter_favs
13 days ago
Twitter
“Two pink wafers left in a biscuit tin... 38” Busy Ladies Bingo at DYING OF LAUGHTER with
from twitter_favs
16 days ago
Twitter
Congratulations and Todd!
❤️🤵🤵❤️

Government Gang at
from twitter_favs
16 days ago
Twitter
RT : Are you passionate about cyber security policy? We're recruiting a Cyber Security Communications and Policy Lead.…
from twitter
16 days ago
Twitter
Sharing in case you know people who’d want to go for this job at Parliament
from twitter_favs
16 days ago
Twitter
You can guarantee after a data breach that the company will trot out the tired old ‘we take the protection / securi…
from twitter_favs
17 days ago
Twitter
42 year old me wishes 21 year old me hadn’t been talked into doing a PhD in AI and machine learning. I’d really lik…
from twitter_favs
17 days ago
Twitter
Today, my big boss praised a piece of my work very highly and quite separately, I had occasion to do an actual happ…
from twitter_favs
18 days ago
Secure email: ProtonMail is free encrypted email.
Got a nice shout-out today from for helping them track down a 19-year-old Internet hoodlum…
from twitter_favs
18 days ago
Twitter
Got a nice shout-out today from for helping them track down a 19-year-old Internet hoodlum…
from twitter_favs
18 days ago
Twitter
This is now the third time in as many weeks there’s been a new incident that reinforces what I keep saying: *never*…
from twitter_favs
19 days ago
Twitter
Check out these "Security User Stories" and "Security Acceptance Criteria":

original pdf b…
from twitter_favs
20 days ago
Twitter
URLs aren't usable, but people are forced to rely on them for so much -- browsing, security, sharing. Expect to see…
from twitter_favs
20 days ago
Twitter
You might want to look into the National Academy of Sciences report from the Research Counse…
from twitter_favs
21 days ago
Twitter
In response to 30 fields you need to focus on - ... I give you 40 things you need to focus…
from twitter_favs
21 days ago
Twitter
In response to 30 fields you need to focus on - ... I give you 40 things you need to focus…
from twitter_favs
21 days ago
Twitter
So over the last few months kids keep coming into the library asking if we have any books about this thing FORTNITE…
from twitter_favs
21 days ago
Twitter
Thanks to everyone who came to EMF this year and made it such an amazing event.

We will return in summer 2020, and…
from twitter_favs
21 days ago
Twitter
These are the 30 fields you need to focus on in the next 10 years

from twitter_favs
23 days ago
Twitter
On the back end processes, if you lack expertise & actual architectural security knowledge, even the cleanest of bu…
from twitter_favs
24 days ago
Twitter
If the message folks are finally getting is "don't start a bug bounty before you're ready" then we are still not ge…
from twitter_favs
24 days ago
Twitter
Tomorrow, dear readers, is the deadline the European Parliament set for the U.S to have its side of Privacy Shield…
from twitter_favs
24 days ago
Twitter
but but bimodal preaches that the agile automated approach is the less stable of the 2 approaches hen…
from twitter_favs
26 days ago
BBC - Homepage
RT : & now have security.txt! Please use these & read our disclosure pol…
from twitter
26 days ago
Twitter
RT : & now have security.txt! Please use these & read our disclosure pol…
from twitter
26 days ago
Untitled (https://www.bbc.co.uk/)
RT : & now have security.txt! Please use these & read our disclosure pol…
from twitter
26 days ago
Twitter
Just used the term "Bimodel process" to describe waterfall and agile processes operating within the same organisati…
from twitter
26 days ago
Twitter
Thanks. I also recommend Expontential View. Not to mention SRE Weekly, DevOps Weekly…
from twitter
27 days ago
Twitter
Do people still recommend things to each other on Twitter?
If so, I'm still reading :…
from twitter_favs
27 days ago
Twitter
I just bought the Broken Token organiser system for Terraforming Mars. I simultaneously blame and thank…
from twitter_favs
28 days ago
Twitter
“A little bit of slope makes up for a lot of y-intercept” -

How fast you learn and grow is more i…
from twitter_favs
28 days ago
Google and Facebook Didn't End Data Privacy - The Atlantic
Well, ain't this some surveillance capitalism propaganda under a veil of nihilism.
from twitter_favs
28 days ago
Brexit’s data bogeyman – POLITICO
For those of you who saw me dry heaving in Vienna the morning after the referendum, this was one of the reasons why.
newsletter  from twitter_favs
28 days ago
Twitter
How many breaches will it take? The latest newsletter is out at
Sign up for it…
from twitter
4 weeks ago
Cyberweekly #14 - How many breaches will it take?
How many breaches will it take? The latest newsletter is out at
Sign up for it…
from twitter
4 weeks ago
(429) https://twitter.com/i/web/status/1032741772667940864
IoT botnet continues to evolve. Find out more about the latest variant uncovered by
from twitter_favs
4 weeks ago
MongoDB Server Exposes Babysitting App's Database
App for connecting babysitters with parents exposed details of more than 93,000 users
from twitter_favs
4 weeks ago
Twitter
My laptop has been stuck here, spinning its little shutdown wheel senselessly for ages now. Seems it has the same p…
from twitter_favs
4 weeks ago
Phishing for Phools – Words That Matter – Medium
“Akerlof and Shiller propose a different theory, one with that marvelous quality of the best insights, which change the way you see, so the world never looks quite the same way again: Fraud and abuse are not market failures. There is an efficient market for everything, including manipulation, fraud, and abuse. “
newsletter 
4 weeks ago
Twitter
We tested what would happen if we blocked accounts attempting to register using common passwords, giving feedback i…
from twitter_favs
5 weeks ago
Twitter
Incredibly fed up of the “security says no” approach from people involved in government tech security. Still too ma…
from twitter_favs
5 weeks ago
Twitter
I am about to tell you an epic tale about subterfuge, dating in the 21st century and the fall of human civilization…
from twitter_favs
5 weeks ago
Botched CIA Communications System Helped Blow Cover of Chinese Agents – Foreign Policy
"But the CIA’s interim system contained a technical error: It connected back architecturally to the CIA’s main covert communications platform. When the compromise was suspected, the FBI and NSA both ran “penetration tests” to determine the security of the interim system. They found that cyber experts with access to the interim system could also access the broader covert communications system the agency was using to interact with its vetted sources, according to the former officials." An interesting read, but a reminder that some of the patterns we use in cybersecurity are important and do result in life or death for real people in real places sometimes. The description further down of the counterintelligence service forming a specific task force to attempt to break the system is a healthy reminder of the sort of adversary that you can face at these higher levels is determined and capable
newsletter 
5 weeks ago
Twitter
What links , and ?

Yes, they are. But they're also PPE-taught bluffers. Find…
from twitter_favs
5 weeks ago
Twitter
And so ends another amazing event. Thanks for having me, everyone. I learnt a ton 😊
from twitter_favs
6 weeks ago
Twitter
I won utterly at Tactical Parental Lie Ins this weekend. DH fancied the Sunday lie in so he got up at 7.15am yester…
from twitter_favs
6 weeks ago
Practical Web Cache Poisoning | Blog
"I'll illustrate and develop this technique with vulnerabilities that handed me control over numerous popular websites and frameworks, progressing from simple single-request attacks to intricate exploit chains that hijack JavaScript, pivot across cache layers, subvert social media and misdirect cloud services."

This is a good demonstration of taking a simple vulnerability, and extending it and increasing it to find more and more ways of exploiting it. Not to mention this is a reminder that the fact that the internet works at all is sometimes a bit scary. Who knew caching systems worked this way.
newsletter 
6 weeks ago
Twitter
I’ve got no idea what I’ve ordered but I don’t think it’s that. It is supposed to click together, that bi…
from twitter
6 weeks ago
Cyberweekly #12 - Should we trust cyber security stats?
And it's out, read your weekly summary of cybersecurity news and articles that I thought were interesting:
from twitter
6 weeks ago
« earlier      
#aws #bbcstrikes #bcl8 #cablegate #confs2011 #esc #fullfrontalconf #girlgeek #girlsinit #gmp24 #hhhmcr #java #kindle #lsug #mashableawards #mubarak #route53 #scala #scalecamp #today #uksnow #wikileaks #win #xfactor #yatw #yummy 0day 2factor academia adacdemia ads advice agile agit ai alevels analysis analytics android api appengine. apple apprentice apps appsforkids aprilfool architecture assange attack attacks attention attitude automated automation aws backlog backup badmath banking bashrc bbc bbcstrikes bcl8 beginner bigdata blockchain blog blogging book boostrap bootstrap brands breach breakdown browser browsers build business cablegate cdn chrome cio ciso closing cloud cms code codeofconduct coffeescript comment communications competition compute computing conferences confs2011 container containers contentapi criticism crypto css cto culture cyber cybersecurity cyberweakly cyberweekly darkmarkets dashboards data database datascience dependencies deployment design desktop detection developers development devnest devnestsf devops devsecops diagrams digitalcurrency diversity djugl dns docker documentation ebook ec2 ecosystem editors education election email empathy engineering englandriots esc etsy eurocrisis exploit faas facts fail fanservice feedback fiction flash flot fluidinfo fraud freeapps freemacbook frictionless fullfrontalconf functional funny future futurist game gamedev gameover games gamesdev gaming gdndi gdpr gds gdstecharch gender girlgeek girlsinit glancables glass glitch gmp24 go golang google googleio government graph graphing graphs growing gu_tech guardian guide gyford habits hackday hacking happy hardware haystack hhhmcr hiring history hosting howto hpwebos html html5 hypermedia ide ideas identification ie6 immutable incident individuals infrastructure injustice innovation insider insiders inspiration installation interviewing interviews intro ios iot ipad it itsy java java8 javascript jccc2 jenkins journalism jquery js json jvm kanban kindle lambda languages launch learning leveson liberties library lift links lists loadbalancer local log4j logging logs longreads lovewins lsug machinelearning mail maintainability malware management manager markdown marketing mashableawards math maturity maven mechanicalturk media medium meetings metrics microservices migration ministers minutes mobile mongodb mongouk monitoring mooc mtg mubarak mvp naming nasa nerd networking news newsletter nickleggsfault no2av node.js oas oauth oexchange online opensource oracle organisation osx outage paas paper paradigm parliament pass passion passwords payments performance phishing pipeline poc policy politics pos pr priorities prism privacy process product programming protocol prototyping psychology publisher push puzzle python quality rant readingthe readlater redesign reference regex registry report research resource responsive rest rights risk route53 rpg ruby saas safety sbt scala scalaz scalecamp scalesummit scaling science scrum security securityengineering sensible seo sequence serverless sexism sidechannel simple singles smartthings social socialmedia source spam speakers sql ssd ssl standards startup startupbritain startups stateactor statics statistics stats status storytime strategy stream study success superiority suppllychain switch switches team teams testing text textual threat threatmodel threatmodelling threats thrift timezones today todayguardian todo tool tools training transform transformation trello trust tutorial tweet twitter u2f ui uksnow uml unikernels usage user-centered-security userrespect ux vagrant vi via:popular video videos virtualisation visa vision visualisation visualise vpn warnings web webapps webdev webops webservices well-known whois wikileaks win wordpress writing xfactor xrd xss yatw yes2av youngrewiredstate yrs2011 yummy zeus

Copy this bookmark:



description:


tags: