![CSOonline Profile](https://pbs.twimg.com/profile_images/1679153007387131909/vgjkdbdb.jpg)
CSOonline
@CSOonline
Followers
63K
Following
13K
Media
1K
Statuses
28K
From @FoundryIDG -- #CSO provides news, analysis and research on #security and #riskmanagement.
Boston area
Joined March 2009
#Cybersecurity skills shortage worsens — The problem is two-fold: 1) Not enough cybersecurity professionals in the overall pool, and 2) An acute shortage of advanced #cybersecurityskills. @joltsik @esg_global @ISSAINTL #securityskills #careers.
20
27
60
Young girls are society's future cyber crime fighters, by @cybersecuritysf @cyber_sn @brain_babe @StaySafeOnline.
3
55
60
Blockchain startup: 300,000 DDoS attacks will cause $150B in damages this year, by @cybersecuritysf -
1
25
35
Free GoCrack password cracking tool helps admins test password security, by @PrivacyFanatic - @FireEye.
0
34
34
The Qubes high-security operating system gains traction in the enterprise, by @toholdaquill -
0
21
34
Shodan finds everything connected to the internet, even stuff that shouldn't be, by @toholdaquill -
0
15
24
Pentester Academy is an affordable resource to learn #pentesting basics. @SecurityTube #infosec by @toholdaquill -
1
15
28
These #infosec & #CyberSec women definitely deserve shoutouts:. @msbrumfield @StephandSec @InfoSecSherpa @hacks4pancakes @gabsmashh @InfoSystir @domyboo @k8em0 . #womenintech #womenshistory #WomensHistoryMonth.
March is #WomensHistoryMonth. Who are some fearless #WomenInTech who deserve a shout-out? Please retweet and tag them to amplify their voice!. #womenshistory
4
13
25
All we can do is shake our head. (sigh).
If you work in InfoSec, this paid- for keynote talk about cybersecurity will very likely cause you to have an emotional reaction. (H/t @Bing_Chris )
1
5
23
10 organizations that promote #diversity in #infosec. @ICMCP_ORG.@WiCySorg.@IOBSE1.@wisporg.@MiCLeadership.@NeuroCyberUK.@womeninid.@Queercon.@EWFUSA.@BlackInCyberCo1. #WomenInTech #BlacksInTech #BlacksInCyber #womenincybersecurity.
1
9
21
What is personally identifiable information (PII)? How to protect it under GDPR, by @rogeragrimes -
0
24
22
We must start educating girls to be the #cybersecurity leaders of tomorrow. -- @SylviaAcevedo, CEO, @girlscouts via @WIRED.
"Educating girls empowers them to make meaningful contributions to society. Contributions that help everyone win. Except cybercriminals." - @SylviaAcevedo
2
12
23
For 3 weeks, the FBI held onto the keys to REvil’s ransomware as cybercriminals locked up company after company’s data. Why?. @burgessct sheds some light on the reasons: #REvil #ransomware #cyberattack #FBI.
0
8
20
#Diversity in security: How 3 organizations are making a difference—one relationship at a time @BlackInCyberCo1 @MiCLeadership @blackgirlshack @ICMCP_ORG @WiCySorg. #BlacksInCyber #BlackTechTwitter #BlacksInTech #WomenInTech #infosec #cybersecurity.
0
23
22
The 10 most powerful cybersecurity companies:. @Cisco.@Cloudflare.@CrowdStrike.@Fortinet.@IBM.@Mandiant.@Microsoft.@PaloAltoNtwks.@Rapid7.@Zscaler. ➡️ Learn what makes these vendors the biggest power players: . #cybersecurity #networksecurity.
0
11
22
Cybercrime in a #recession — Economic downturns force #cybercriminals to change focus & encourage others to resort to #cybercrime. Here are 10 things CISOs need to know: @DanSwinhoe @jeff_pollard2 @go1denhokie @uuallan. #phishing #malware #ransomware.
0
17
19
#Ad: Check out our new tool for benchmarking your company’s cloud strategy based on our latest IDG research survey.
2
5
21
Improved #cybersecurity is more often cited as one motivation for #digitaltransformation, by @MariaKorolov
1
18
20
#Google launched a commercial #zerotrust remote access service that enables #WorkFromHome employees to access internal web-based apps without the need of VPNs. . #BeyondCorp #RemoteAccess #NetworkSecurity #ZeroTrustNetworking @googlecloud.
0
9
19
Disinformation has become a cyber threat. Employees who believe disinformation are more susceptible to social engineering and phishing campaigns – and attackers know it. @burgessct #socialengineering #phishing #cybersecurity #insiderthreat.
0
11
17
Microsoft announces new security tools @MS_Ignite #MicrosoftDefender #DataPrivacy #InsiderThreat #ThreatDetection #MSIgnite.
6
8
19
Hackers create TSA master key for @SafeSkiesLocks from scratch, release designs | #hope11 #hopeconf by @SteveD3 -
0
23
18
Cloud security, network security and managed services -- just a few things people and vendors were buzzing about last week at #RSAC2019 @joltsik #cybersecurity #CloudSecurity #NetworkSecurity #RSAC.
0
7
18
Looking to update your #IT and #datasecurity strategies in 2022? #Cybersecurity experts share their tips. @ScottBVS @nyike @willkelly @itlinchpin @apstein2 @jckgld @kaynemcgladrey @GeneDeLibero @Benni_aji.@benrothke @fcutitta. #sponsored by @ATTBusiness.
1
9
18
Legions of #cybersecurity volunteers work to protect hospitals from #cyberattacks during the #COVID19 crisis . @CTIleague @marcwrogers @n0x08 @TheChrisAM @OhadMZ @metacurity . #CTILeague #healthcare #malware #phishing #cybercriminals.
2
17
18
157 GB of highly sensitive data exposed. The data stored on the #LevelOne server didn’t require even a password to access it, @UpGuard reported. #CyberSecurity #DataBreach.
1
15
17
Organizations have too many #cybersecurity tools – and threats are getting lost in the many, many alerts. What they want is 5 tools consolidated into 1, writes @joltsik #threatdetection #networksecurity #endpointprotection #EDR #NTA #malware #analytics.
1
14
20
#Credentialstuffing, the automated use of breached usernames and passwords to access accounts, is low risk, high reward for #cybercriminals. There are things you can do, though, to make it harder for them. @troyhunt.
0
11
20
How Shodan helped bring down a ransomware botnet: Shodan is a search engine that looks fo. | via @MariaKorolov.
0
27
17
California’s consumer #privacy act could have more repercussions on US companies than the EU’s #GDPR. @MariaKorolov breaks down what it is, types of companies affected, data it covers & more. #CCPA #dataprivacy.
2
17
16
As we all deal w/ the personal effects of #covid19, @IDGworld’s #enterpriseit sites can help you deal with the IT & tech implications. See our ongoing coverage here: And at:.* @CIOonline: * @NetworkWorld:
0
7
19
If you still use #ActiveDirectory to manage identity for remote workers, you might want to consider moving to Azure Active Directory. @SBSdiva #AzureAD #IAM #NetworkSecurity.
0
6
18
A disaster waiting to happen – The number of #botnet attacks on APIs in increasing, yet companies lag in implementing bot detection tools and best practices #cybersecurity #cybercrime #cyberattack.
0
18
17
What is cyber resilience? Building cybersecurity shock absorbers for the enterprise, by @TerenaBell -
0
12
19
The challenge for #security teams remains how to add security at the speed of #digitaltransformation. Organizations are doing it, though. @StacyTC @IDC_DigiSec @SchneiderElec.
0
7
17
200 cybersecurity startups that received venture capital in 2017, by @cybersecuritysf #cybersecurityinvestments.
0
12
16
Cybersecurity gaps in federal agencies threaten national security, the GAO says. The organization highlighted 4 areas that must be addressed. @burgessct #cybersecurity #government #USgovernment.
0
10
16
Anyone who takes #creditcard payments needs to adhere to #PCIDSS — and may face fines if they fail. Use this guide to ensure you’re complying with the #cybersecurity standard: #websecurity #websitesecurity #ecommerce.
0
22
15
Many cities and regions are vying for the title of #Cybersecurity Capital. These 10 are the top contenders. Some you’d expect, but others might surprise you. @James_A_Martin @CybersecuritySF @VerizonVentures @SDCCOE @CushWake @GACyberCenter.
0
11
18
Top ways attackers gained access to Windows networks in 2020. 1. Using PowerShell and Windows Command Shell.2. Signed binary process execution using Rundll32 & Mshta.3. Creating and modifying system processes. @redcanary #NetworkSecurity #CyberAttack.
1
7
16
Before you buy a cybersecurity platform, make sure it has these features. #cybersecurity #cybersecuritytools.
0
14
18
As cyber crime goes up, these companies are kicking up their #cybersecurity efforts, by @cybersecuritysf
0
14
16
SAP users take note – Security experts warn of easy-to-use exploits that could lead to wave of attacks against #SAP systems. @lconstantin explains what users should do. @marianonunezdc @onapsis #SAPGateway #SAPMessageServer #SAPexploits #cybersecurity.
0
9
17
The state of the #DarkWeb — Professional criminal gangs, #malware as a service, and improved infrastructure for carrying out criminal activity are changing the dark web. @Ax_Sharma #cybercrime
0
12
17
Traditional firewalls are no longer effective, but today's smart #firewalls are a different story. #cybersecurity
0
15
16
9 top anti-phishing tools. 💠 @BrandShieldltd Anti-#Phishing.💠 @RSAsecurity FraudAction.💠 @AvananSecurity.💠 @Barracuda Sentinel.💠 @IRONSCALES.💠 @Mimecast.💠 Office 365 Advanced Threat Protection.💠 @phishprotection.💠 @Sophos Email.
1
5
16
CISOs will be looking for information on these #cybersecurity topics when they head to @RSAConference #RSAC.
0
9
15
9 types of #malware + how to recognize them and remove them. ❗️Viruses.❗️Worms.❗️Trojans.❗️Hybrids & exotic forms.❗️#Ransomware.❗️Fileless malware.❗️#Adware.❗️#Malvertising.❗️#Spyware. ➡️ Get the details: #cybersecurity #cybercrime.
1
12
17
. @cisco purchase of @duosec opens many new #IAM and #cloudsecurity opportunities for the company, writes @joltsik #networksecurity.
0
12
17
Cyber attackers are getting smarter – bypassing endpoint protection security and accessing data. @MariaKorolov explains how they’re doing it – the top methods they use #malware #cyberattack #cybersecurity #EndpointSecurity.
1
21
16
The rate of internet connection is outpacing our ability to secure it, by @cybersecuritysf #cybersecurity.
0
18
16
With Zeek – formerly called Bro -- security pros can extract valuable network data and detect threats better, faster, writes @zkerravala @Bro_IDS #NetworkMonitoring #ThreatDetection.
0
13
17
#Hackers love going after city & regional governments. @metacurity explores why and what municipalities can do to reduce the threat. . #cybersecurity #cyberattack #malware #ransomware #threatdetection.
0
14
16
GDPR boosts IAM & biometrics spending, by @cybersecuritysf #GDPR #GDPRcompliance #IAM #IdentityAccess.
1
17
16
You’ve heard of #phishing attacks, well, now we have #smishing (via SMS messages) and #vishing (via voice calls). @MichelleDrolet2 explains what they are. #cyberattack #cybersecurity #hacking.
0
8
14
All you need to know about #botnets -- @MariaKorolov explains how they work, the damage they do, how to detect them, and how to prevent botnet attacks #IoT #IoTsecurity #mirai #reaper #echobot.
0
13
14
Want better #mobilesecurity or #dataprivacy? Try these Android and iOS alternatives: #GrapheneOS and /e/OS @GrapheneOS @e_mydata @DanielMicay @seanodiggity @fs0c131y @craiu @gael_duval @fjeronimo @AFiscutean.
0
10
13
A business will fall victim to a ransomware attack every 14 seconds -- by @CybersecuritySF #CybersecurityFacts.
1
31
16
5 open-source #IntrusionDetection systems for SMBs. ✅ #Snort.✅ #Zeek.✅ #OSSEC.✅ #Suricata.✅ #SecurityOnion. Learn about them here: @Snort @Zeekurity @ossec @Suricata_IDS @securityonion @MichelleDrolet2. #IDS #NetworkSecurity #SMB #OpenSource.
0
9
16
Security can no longer be considered an IT afterthought at small and midsize businesses, writes @joltsik #CyberSecurity #CyberSecurityChallenges #SMBs.
0
18
16
Beware – A #hacker group known for targeting #fintech companies has new #Python #malware and infection tricks. #Evilnum #WindowsSecurity #PyVil #RAT #cyberattack #APT.
0
12
14
How to secure the cloud — Tools, information and organizational structure needed to execute a successful #cloudsecurity strategy @mgbits @AlertLogic @gigamon @vansonbourne @menadeau.
0
9
14
AWS is suddenly a force in the cybersecurity market, by @cybersecuritysf #AmazonGuardDuty #CloudSecurity.
1
20
14
If you can do only a few of the 20 CIS Critical Security Controls, @rogeragrimes says you should do these 5: @CISecurity #security #cybersecurity #cyberdefense.
0
9
16
3 ways #cybercriminals are exploiting the #COVID19 crisis . 1. #Phishing emails.2. Malicious apps.3. Bad domains. ➡️ Learn more about these & other threats: @DanSwinhoe @digitalshadows @proofpoint @BAESystems_AI @Bitdefender
0
12
16
"#Hacking web applications is an easy first step into #pentesting." #infosec @OWASP, by @toholdaquill -
0
9
15
#Phishing is the root cause of 48 percent of data breaches, according to recent @F5Labs report. Education & the right #security tools can reduce that, writes @zkerravala #email #emailsecurity #databreach.
0
12
12