Cyber Outlook Profile Banner
Cyber Outlook Profile
Cyber Outlook

@CyberOutlook

Followers
8,493
Following
6,205
Media
40
Statuses
686

Helping people explore and navigate #Cybersecurity . We share #InfoSec news, knowledge and resources from experts. Founded by an active CISO & CISSP.

United States
Joined July 2022
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@CyberOutlook
Cyber Outlook
1 year
Tweet media one
10
57
376
@CyberOutlook
Cyber Outlook
2 years
The LastPass breach shows why it's so important to use long complex passwords, especially a master pw. The time to brute force a long pw is significantly more. A complex 8 character pw can be cracked in 1 day whereas 14 characters is up to 200M years. #cybersecurity #cyberattack
Tweet media one
13
125
248
@CyberOutlook
Cyber Outlook
2 years
Check out Cyber Outlook's Cybersecurity Community on Discord to share resources, answer questions, discuss news and trends. It's a great place to learn and collaborate on all things InfoSec. Open to all!😊 #cybersecurity #security #tech #infosec
Tweet media one
1
7
25
@CyberOutlook
Cyber Outlook
1 year
A good CISO should be willing and able to effectively hold a seat on the board. And everyone should get ready because the SEC, among other regulators, will be forcing the hand soon. #cybersecurity #infosec #ciso
@SCMagazine
SC Media
1 year
Roughly 1 in 7 CISOs stand out for possessing the necessary traits for a position on a board of directors, according to a new report by @IANS_Security . #cybersecurity #infosec #ITsecurity
0
3
3
0
4
15
@CyberOutlook
Cyber Outlook
2 years
There are many great organizations serving the Cybersecurity community by offering free Webinars and Virtual Conferences that anyone can attend, and you should! Check out the latest top sources that we attend:
Tweet media one
0
2
13
@CyberOutlook
Cyber Outlook
10 months
The demand has only continued to rise, so this is a separate issue with the economy that many industries are facing, which has led to layoffs or hiring freezes. Cybersecurity still has a lot of opportunities compared to most industries.
@SCMagazine
SC Media
10 months
#Cybersecurity , a notoriously shorthanded field, is expected to face a decrease in hiring for the first time since 2020, creating a record high IT security employment gap, according to a new ICS2 study. #infosec #ITsecurity
0
4
4
1
9
15
@CyberOutlook
Cyber Outlook
2 years
Healthcare orgs should be on high alert - the U.S. gov and authorities are warning the healthcare sector of a surge in DDoS attacks against hospitals and medical entities instigated by the Russian backed hacking group KillNet. #cyberattack #infosec
1
8
12
@CyberOutlook
Cyber Outlook
1 year
Read the latest Cyber Outlook Rundown: A Cybersecurity briefing on recent noteworthy Cyber Attacks, Vulnerabilities, and InfoSec news. We highlight useful resources to help people improve Information Security. #cybersecurity #infosec #cyberattack
Tweet media one
2
7
10
@CyberOutlook
Cyber Outlook
2 years
Have you created a formal policy for each security control within your InfoSec Program? Most orgs need to improve their process for creating and updating policies. Read more to improve your cybersecurity policies. #cybersecurity #security #tech
1
1
11
@CyberOutlook
Cyber Outlook
1 year
This is a very useful resource for building and managing security programs, download the free EA reference guide from CSA. #cybersecurity #infosec
@cloudsa
CloudSecurityAlliance
1 year
CSA’s #EnterpriseArchitecture enables security professionals to leverage a common set of controls. Learn more about the Business Operation Support Services domain, which contains the corporate support functions that are critical to any security program →
0
0
3
0
4
9
@CyberOutlook
Cyber Outlook
2 years
Penetration Testing is important for hardening your network and systems. Best practices require tests be conducted at least once per year and whenever there is a major change. So it is extremely important to fully understand. #cybersecurity #pentesting
Tweet media one
0
5
10
@CyberOutlook
Cyber Outlook
2 years
Dark Web Monitoring is very important for both personal and business use. This is a big trend this year because it provides a lot more visibility into potential threats or possible breaches and it's very cost effective. #cybersecurity #infosec #darkweb
1
7
9
@CyberOutlook
Cyber Outlook
2 years
Kicking off Cyber Outlook's FREE Cybersecurity Discord Server to share info, ask questions, discuss news and just collaborate on all things Cybersecurity. Open to all, so get involved!
Tweet media one
0
4
8
@CyberOutlook
Cyber Outlook
2 years
The TSA issued a security directive to all U.S. airports warning them about the need for more stringent cybersecurity protections after last week’s discovery that a copy of the federal “no-fly” list was leaked due to very poor security controls. #infosec
0
0
6
@CyberOutlook
Cyber Outlook
2 years
With Black Friday and Cyber Monday around the corner, a lot of Cybersecurity training sites are offering great discounts. No better time to decide on the next cert you'd like to earn in 2023 and take advantage of these training deals, so keep an eye out... #learn #cybersecurity
1
1
7
@CyberOutlook
Cyber Outlook
2 years
Social engineering attacks will continue to get more convincing and sophisticated... Good for the person reporting this. Schools and businesses need to keep up with training for new attack trends. #cybersecurity #Security #awareness
@cybersecboardrm
Bob Carver ✭
2 years
Posing as a professor, a hacker lured a U.S. academic into a Zoom call, hoping to snatch passwords and create havoc. Instead, he ended up caught on tape in a botched attempt #CyberSecurity #Iran #US #professor #Zoom #video
2
4
10
0
2
7
@CyberOutlook
Cyber Outlook
1 year
Read the latest Cyber Outlook Rundown: A Cybersecurity briefing on recent noteworthy Cyber Attacks, Vulnerabilities, and InfoSec news. We also highlight new useful tips and resources to help improve Information Security. #cybersecurity #infosec
Tweet media one
0
3
7
@CyberOutlook
Cyber Outlook
2 years
This is a good brief overview of Cybersecurity management, specifically CISO responsibilities, from the eccouncil. Every organization should have a CISO or similar role at this point. Most regulations are now requiring it. #cybersecurity #Security #tech
0
1
6
@CyberOutlook
Cyber Outlook
2 years
Check out our Daily Security Control (DSC), continuing with the security safeguards around Asset Management. #cybersecurity #securitycontrol #securityframework
0
0
7
@CyberOutlook
Cyber Outlook
2 years
This is absolutely something that should be monitored this year by cybersecurity professionals. There is no doubt that AI is playing a significant role for both hackers and security practitioners moving forward.
@CyberNews
CyberNews
2 years
▪️ @CyberNews research▪️ The viral #AI chatbot #ChatGPT might advise #threat actors how to #hack into networks with ease. #cybersecurity #infosec #exploit #cybersec
0
5
7
0
2
5
@CyberOutlook
Cyber Outlook
2 years
That's a scary statistic. All organizations need to focus on creating and improving Incident Response Plans as cyber attacks continue to rise. #cybersecurity #infosec #cyberattack
@CISAgov
Cybersecurity and Infrastructure Security Agency
2 years
Only 16% of public safety orgs have a mitigation strategy to respond to cyberattacks, according to the 2018 SAFECOM Nationwide Survey. The NECP provides recommendations and best practices to assist in strengthening your orgs cybersecurity posture:
Tweet media one
3
21
41
0
3
5
@CyberOutlook
Cyber Outlook
1 year
Kali Linux celebrates their 10th Anniversary with the first 2023 release. This version introduces Kali Purple, with a focus on defensive security, designed for learning, practicing SOC analysis, threat hunting and security control design/testing.
0
4
6
@CyberOutlook
Cyber Outlook
2 years
Read the latest Cyber Outlook Rundown: A Cybersecurity briefing on noteworthy Cyber Attacks, Vulnerabilities, and InfoSec news. ChatGPT Concerns, Malvertising Grows, Crypto Heists Surge #cybersecurity #infosec #cyberattack #cyberthreat #security
Tweet media one
0
1
6
@CyberOutlook
Cyber Outlook
2 years
Check out the latest Cyber Outlook Rundown: A Cybersecurity briefing on noteworthy Cyber Attacks, Vulnerabilities, and InfoSec news. #cybersecurity #infosec #cyberattack #security #tech
Tweet media one
1
1
6
@CyberOutlook
Cyber Outlook
2 years
Check out the latest Cyber Outlook Rundown - A Cybersecurity briefing on noteworthy Cyber Attacks, Vulnerabilities, and InfoSec news. #cybersecurity #infosec #cyberattack #security #tech
Tweet media one
0
2
6
@CyberOutlook
Cyber Outlook
2 years
Most #cybersecurity frameworks and regulations require organizations to conduct a risk assessment at least once per year. The output, being a risk register, should be used to create a roadmap and updated throughout the year as goals and priorities change.
0
1
6
@CyberOutlook
Cyber Outlook
2 years
It's the last week of Cybersecurity Awareness Month. Have you learned anything new or done anything different to improve your cybersecurity?? Try to pick a short goal to complete by the end of the month so we can all get better! #cybersecurity #security #tech #securityawareness
Tweet media one
0
2
5
@CyberOutlook
Cyber Outlook
2 years
What a terrible way to approach this... I thought the mission was to reduce scams and bots @elonmusk . Maybe they should lock the account and force them to setup MFA with an authenticator app, which is the best option anyway. #cybersecurity #infosec
0
3
5
@CyberOutlook
Cyber Outlook
2 years
Check out these great Cybersecurity Podcasts to get your daily dose of security news and trends. There are interesting interviews and engaging discussions on security topics and debates you can listen to. #Cybersecurity #Tech #Security #Podcasts
0
6
6
@CyberOutlook
Cyber Outlook
2 years
Check out this high-level guide covering some important steps to creating a cybersecurity program for your business. Start with adopting a framework, inventorying all systems and data, and then creating a risk register. #cybersecurity #security #tech
@TechTargetNews
TechTarget News
2 years
This in-depth #cybersecurity planning guide provides information and advice to help organizations develop a successful strategy to protect their #IT systems from attacks.
0
0
2
0
1
6
@CyberOutlook
Cyber Outlook
2 years
Misconfigurations have been in the top 10 of every security incident list this year proving IT teams lack reliable Change Mgmt, QA and Auditing processes. These seem to get pushed aside when teams are overwhelmed or understaffed and need serious attention. #cybersecurity #cloud
@RSAsecurity
RSA
2 years
By 2023, 99% of #cloud security failures will result from #multicloud control misconfigurations, per @Gartner_inc 🤯 That's why organizations *must* secure multicloud with #IGA and #CIEM and move toward #ZeroTrust before it's too late ⬇️ #Cybersecurity
0
1
3
0
1
5
@CyberOutlook
Cyber Outlook
2 years
We are kicking off our Daily Security Control (DSC) initiative to help people understand cybersecurity controls. Today we cover CIS 1.1, Manage and Maintain an Asset Inventory. An important foundation of Cybersecurity. #cybersecurity #securitycontrols
0
3
5
@CyberOutlook
Cyber Outlook
2 years
Daily Security Control (DSC) - Address Unauthorized Assets, check out this security control and what should be addressed to secure your network. #cybersecurity #securitycontrols #networksecurity #cyberdefense
Tweet media one
0
3
4
@CyberOutlook
Cyber Outlook
2 years
Media attention is causing confusion with orgs believing ALL Zero-Days are Critical and must be treated with the highest urgency. A Zero-Day is just a new vulnerability without a patch yet and the severity still depends on the exposure, impact, risk, etc. #cybersecurity #tech
Tweet media one
1
0
5
@CyberOutlook
Cyber Outlook
2 years
@esther_hamzat Very true. I always recommend picking a beginner certification right away, like Security+ or Certified in Cybersecurity from ISC2 bc this gives you a specific goal, helps you focus on what to learn and will give you credibility for your first job.
0
2
5
@CyberOutlook
Cyber Outlook
2 years
Last week, bad actors launched a widespread ransomware attack on VMware ESXi hosts via CVE-2021-21974, an old vulnerability that allows them to run a remote exploit, without prior authentication. Over 3200 servers hit. #cybersecurity #vmware #cyberattack
0
3
5
@CyberOutlook
Cyber Outlook
2 years
Google announced their OSV-Scanner, that offers easy access to vulnerability info for various projects, currently supporting 16 ecosystems, including all major languages, Linux distributions, Android, and OSS-Fuzz. #cybersecurity #vulnerabilitymanagement
1
0
5
@CyberOutlook
Cyber Outlook
2 years
Patching is important but not enough. Vulnerability Scanning is critical for all businesses to ensure their devices and applications don't have any known security bugs. Check out this post on Vulnerability Scanning Solutions. #cybersecurity
0
2
5
@CyberOutlook
Cyber Outlook
2 years
Now that it's September, budget conversations for 2023 are in full force and businesses need to account for increased security needs as technologies expand to the cloud. Take a look at this article on budget analysis. #cybersecurity
0
1
4
@CyberOutlook
Cyber Outlook
1 year
Check out the new AWS benchmarks released by the CIS. #cybersecurity #infosec
@CISecurity
Center for Internet Security (CIS)
1 year
🎉 We've got something new for you! Learn about the brand new CIS @awscloud Compute Benchmark, now covering multiple services from #AWS . #cybersecurity #aws #cybersecurity
Tweet media one
0
3
7
0
0
5
@CyberOutlook
Cyber Outlook
2 years
@DThompsonDev Here's some good articles with excellent resources for cybersecurity beginners or professionals looking to grow their career. YouTube Channels Certs Podcasts Books Hope they help 😊
1
2
5
@CyberOutlook
Cyber Outlook
1 year
Until there are better security controls available, this needs to be managed and monitored carefully. That said, trying to forcefully slow down tech development is not good, so maybe this is better controlled by how it's released to the general public... #AI #cybersecurity #tech
@ISC2
ISC2
1 year
A poll of @ISC2 members suggests there is an appetite for tighter regulation of #ai development in the face of rapid adoption.
Tweet media one
0
1
5
1
1
4
@CyberOutlook
Cyber Outlook
2 years
Check out this handy list of resources SANS provides. We constantly reference their whitepapers and other resources. Very useful and free! #CyberSecurity #infosec
@SANSInstitute
SANS Institute
2 years
Looking for #FreeResources like webcasts, tools, posters, and whitepapers? Check out our SANS #CyberDefense page for all the latest in the field:
Tweet media one
0
2
7
0
1
5
@CyberOutlook
Cyber Outlook
2 years
Another example of a Cyber Breach, this one affecting 100,000 students, due to a Cloud network misconfiguration... This is why strict change management, audits and assessments are so important! #cybersecurity #securityassessment #Pentesting
0
1
5
@CyberOutlook
Cyber Outlook
2 years
Happy labor day to everyone in the workforce. "Your work is going to fill a large part of your life, and the only way to be truly satisfied is to do what you believe is great work. And the only way to do great work is to love that you do." -Steve Jobs #cybersecurity #cybercareer
0
0
4
@CyberOutlook
Cyber Outlook
2 years
The CIS Benchmarks are extremely helpful and every organization should take advantage of them. Today @CISecurity has released two new free benchmarks for AWS! AWS Foundations Benchmark v1.5.0 and Bottlerocket Benchmark v1.0.0 Learn more: #cybersecurity
0
2
5
@CyberOutlook
Cyber Outlook
2 years
@dachicody You don't need to be proficient in any scripting or coding unless you're focusing on app security. But having a technical background absolutely helps. Cybersecurity has several different areas of expertise and roles within it and many great opportunities!
1
0
5
@CyberOutlook
Cyber Outlook
1 year
Due to the availability of malware such as Emotet, deploying backdoors on victims' networks is becoming easier and more lucrative for cybercriminals, leading to it taking the top of the list for cyber attackers. #cybersecurity #infosec
0
2
5
@CyberOutlook
Cyber Outlook
1 year
No surprise here, expect similar activity to increase... #AI #chatgpt #tech
@CyberNews
CyberNews
1 year
The CMA announced that it had launched an “initial review” of #AI foundation models or #software behind popular #chatbots like #ChatGPT . #AI #ArtificialIntelligence #tech
0
0
3
0
1
5
@CyberOutlook
Cyber Outlook
2 years
Based on 10 years of data, Coalition predicts a 13% increase in monthly vulnerabilities this year, approximately 1,900 CVEs including 270 high-severity and 155 critical-severity. Automation is critically important to manage this. #cybersecurity #infosec
0
0
5
@CyberOutlook
Cyber Outlook
2 years
Cyber insurance is critical for businesses but premiums have risen significantly the past few years which is concerning. Orgs need to determine their needs and budget vs risk tolerance. You should be aware of changes like this and exercise due diligence at renewal. #cybersecurity
@DarkReading
Dark Reading
2 years
Cyber-Insurance Firms Limit Payouts, Risk Obsolescence: by @roblemos
0
4
6
0
1
5
@CyberOutlook
Cyber Outlook
2 years
CISA is tightening the requirements around Cyber Incident Response. Many agencies have enforced similar requirements including the TSA and FDIC. The SEC has also recently proposed this. This will continue to be a trend... #cybersecurity #security #tech
0
2
5
@CyberOutlook
Cyber Outlook
2 years
Check out this interesting report analyzing the growing Command & Control framework, Sliver. It details how the framework works, how to reproduce its use, how threat actors leverage it and implementing detection and prevention mechanisms. #Cybersecurity
0
2
4
@CyberOutlook
Cyber Outlook
2 years
Make sure users in your organization are aware of this tactic. Although it's not a new idea, it's more sophisticated, targeted and convincing. When a threat is made of a charge or debt, unless you call back, that fear compels users to respond. #cybersecurity #securityawareness
@DarkReading
Dark Reading
2 years
Ransomware gang uses "call-back phishing" to infiltrate organizations of all sizes. via @jaivijayan #LunaMoth
1
3
6
0
2
4
@CyberOutlook
Cyber Outlook
2 years
As we wrap up 2022, it's important to look back at the most prevalent cyber threats and learn from the breaches that occurred. Check out the Verizon Data Breach Report which has a lot of useful info and stats, broken down by industry. #cybersecurity
0
2
4
@CyberOutlook
Cyber Outlook
2 years
Check out this excellent training video from TCM Security on Ethical Hacking. The video is 15 hours long and was just released about a month ago, so it contains a lot of good up-to-date material. #cybersecurity #ethicalhacking #pentesting
0
0
4
@CyberOutlook
Cyber Outlook
2 years
@SecurityAura Guess they showed them! 🤦‍♂️
0
0
3
@CyberOutlook
Cyber Outlook
2 years
This is an interesting ransomware tactic to be aware of... Rather than specifying an amount, they negotiate with victims, and they request cyber insurance details so that their demands can be adjusted to fall within the policy. #cybersecurity #infosec
0
2
4
@CyberOutlook
Cyber Outlook
2 years
Many people don't realize how widespread and readily available compromised data is. The dark web isn't just a scare tactic, it's real and anyone can get access in minutes. These metrics are a little peak behind the glass. #cybersecurity #security
0
1
3
@CyberOutlook
Cyber Outlook
2 years
Lack of proper Cloud security controls and misconfigurations are in the top 5 causes of data breaches... This needs to be a focus for cybersecurity departments. #cybersecurity #infosec #cloudsecurity
@DarkReading
Dark Reading
2 years
How the Cloud Is Shifting CISO Priorities by Shai Morag CEO @ErmeticSec #CISO #cloud
0
1
4
0
0
4
@CyberOutlook
Cyber Outlook
2 years
Be careful with your Cloud services! Even if you're using a top known service like Google Drive or Dropbox, doesn't mean your account and data are safe. Make sure you have MFA setup and are using a long password unique from your other accounts.
@TheHackersNews
The Hacker News
2 years
Russian state-sponsored APT29 hackers taking advantage of legitimate cloud services such as #Google Drive and #Dropbox to deliver malicious payloads to compromised systems. Read details: #infosec #cybersecurity #malware
4
67
94
0
1
4
@CyberOutlook
Cyber Outlook
1 year
There's a lot of talk about ChatGPT, but don't lose focus on the larger picture of AI threats to businesses. 🚨 Top #AI #Cybersecurity #Risks ! 🤖 1️⃣ Automation of large scale attacks 2️⃣ Evolving malware at rapid speeds, outsmarting defenses 3️⃣ Advancing social engineering - too
0
1
3
@CyberOutlook
Cyber Outlook
2 years
Don't panic if you suddenly get a notification in Windows that Defender has detected a threat; there's a recent false positive for Chrome apps classified as Hive.ZY and MS is working on it. Read here #cybersecurity #vulnerability #windows
0
0
3
@CyberOutlook
Cyber Outlook
2 years
Check out this good free walkthrough to setup Splunk and familiarize yourself with it. Good practice for all the Cybersecurity/SOC Analysts out there. #Cybersecurity
@LetsDefendIO
LetsDefend
2 years
👑New Free Hands-On Course: Splunk Use Splunk as a SOC member and be comfortable to search data. 🔹Introduction to Splunk 🔹Splunk Installation on Windows/Linux 🔹Splunk Universal Forwarders 🔹Add Data to Splunk 🔹Search on Splunk 🔹...
3
47
174
0
0
4
@CyberOutlook
Cyber Outlook
2 years
Incident Response is a crucial part of every Cybersecurity Program. Auditors and Cyber Insurers are not only looking for a formal policy but companies are training all staff and conduct annual tabletop exercises. Learn more: #cybersecurity #security #tech
Tweet media one
0
1
4
@CyberOutlook
Cyber Outlook
2 years
OpenSSL released information on the new vulnerability warned from last week. The Critical severity was downgraded to High, but still very important to address right away. All the info can be found here: #cybersecurity #vulnerability #tech
Tweet media one
0
2
4
@CyberOutlook
Cyber Outlook
2 years
Check out our Daily Security Control (DSC), continuing with the security safeguards around Asset Management. #cybersecurity #securitycontrol #securityframework
0
0
4
@CyberOutlook
Cyber Outlook
2 years
Stress management and work-life balance is always important, especially with Cybersecurity Blue and IR teams where the pressure can be very high. We have to be careful this doesn't lead to being overwhelmed or distracted and putting our guard down... #cybersecurity
@CyberNews
CyberNews
2 years
#Cyberattacks create pressure on security teams guarding #IT infrastructure. Stress often leads to mistakes, and adversaries anticipate exploiting cracks in the defensive walls. #Russia #ddos #cyberattack #cybersecurity #infosec #cyberwar
0
0
5
0
0
4
@CyberOutlook
Cyber Outlook
2 years
People need to be aware of how prevalent the spread of disinformation is and understand the real impact it has...There should be a better solution for fact/source verification the public can trust to easily identify malicious or fake content 🤔 #security
0
0
4
@CyberOutlook
Cyber Outlook
2 years
CSF 2.O is on its way! Join the NIST virtual event on Feb 15th to discuss the proposed changes to the Cybersecurity Framework (CSF) leading to the release of 2.0 with fellow professionals. #cybersecurity #infosec #NIST
0
0
4
@CyberOutlook
Cyber Outlook
2 years
The CSA combined current expertise with results from a widespread survey conducted to create the 2022 Top Cloud Threats report - the ‘Pandemic Eleven’. This is very valuable and useful for orgs leveraging the Cloud. #cybersecurity #cloud #security
0
1
4
@CyberOutlook
Cyber Outlook
1 year
Check out our latest guide discussing why you need a Data Inventory, how it can help secure your company, and the steps to create one. It might seem obvious, but it's very underrated and many companies don't take the time to properly create one.
Tweet media one
0
1
3
@CyberOutlook
Cyber Outlook
2 years
Defense-in-depth is an important design practice in cybersecurity programs for all organizations. Never put all your eggs in one basket, there should be separate security defenses at each layer of the network.
@CISecurity
Center for Internet Security (CIS)
2 years
A defense-in-depth strategy protects the confidentiality, integrity, and availability of networks and the data within. Learn the benefits #SLTT organizations can gain from adopting this strategy here. #cybersecurity
Tweet media one
0
0
5
0
0
4
@CyberOutlook
Cyber Outlook
2 years
Important topic to follow in #Cybersecurity . Governing bodies need to draw reasonable lines for due care/diligence for social media. Social media is a business and users are customers they must protect. They have a responsibility to prevent disinformation but uphold free speech.
@CyberScoopNews
CyberScoop
2 years
Tech execs appeared at Senate hearings on #disinformation , facing blistering attacks from lawmakers & former colleagues who say their companies allow the spread of untrue, divisive & extremist content because it is profitable, reports @SuzanneMSmalley .
0
6
10
0
0
4
@CyberOutlook
Cyber Outlook
2 years
This will continue to be the pattern this year. Ultimately Security Awareness Training always needs to be a high priority. Conducting one basic training per year is not enough. It needs to be continuous, interactive and covering new trends. #cybersecurity #securityawareness
@Mandiant
Mandiant (part of Google Cloud)
2 years
There was a 61% increase in the rate of #phishing attacks in the six months ending October 2022 compared to the previous year. Luke McNamara spoke to @CNBC on the increase, what lures attackers could be using & how users can protect their accounts. ⬇️
0
8
13
0
0
4
@CyberOutlook
Cyber Outlook
2 years
Pen Testing vs Vulnerability Scanning: Do you Need Both? There is some overlap between the two, but it's important to recognize the differences and why each are absolutely needed. Read more here: #cybersecurity #security #tech #infosec
Tweet media one
1
3
4
@CyberOutlook
Cyber Outlook
2 years
Important to understand the different tiers of cyber attacks and what your network should be prepared to defend against.
0
0
4
@CyberOutlook
Cyber Outlook
2 years
Good article to check out - there are a lot of recurring themes between CISOs across different companies and industries. MFA still has a lot of challenges (mainly the lack of it, sadly) and is getting a ton of attention... #cybersecurity #security
1
0
4
@CyberOutlook
Cyber Outlook
2 years
Healthcare organizations need to continue to be on High Alert. Make sure critical infrastructure is patched, any unnecessary ext access vectors should be locked down and monitoring watched diligently. #cybersecurity #infosec #killnet
@FalconFeedsio
FalconFeeds.io
2 years
"It's time for stage 2!!! " - #KILLNET claims to have withdrawn from the attacks on medical institutions. #DDoSAttack #CyberAttack #DDoS #threatintel #cyberrisk
Tweet media one
0
4
1
0
0
4
@CyberOutlook
Cyber Outlook
2 years
This is a great list, thank you for the reference! I subscribe to many of these channels and I encourage everyone to check them out and subscribe to their favorites!
@Nickieyey
Nicky
2 years
I have compiled a list of Best Cybersecurity Youtube Channels, that talk about various topics related to cybersecurity. Do check it out 👇 Here is the link to the Github repository: #Pentesting #CyberSec #cyberawarness #bugbounty #infosec #bugbounty
Tweet media one
58
603
2K
0
0
4
@CyberOutlook
Cyber Outlook
2 years
This is an excellent free resource from SANS that explains the functions and responsibilities of a Security Operations Team (SOC), as well as the common tools that are used. #CyberSecurity #Securityoperations #SOC
0
1
4
@CyberOutlook
Cyber Outlook
1 year
Interesting debate... Organizations should never pay the ransom, but should that be enforced by law? #cybersecurity #infosec #ransomware
@cloudsa
CloudSecurityAlliance
1 year
Countries like Australia are considering codifying payment bans into law, and both Florida and North Carolina have made it illegal for state agencies to pay ransoms. But is this wise? Zscaler’s CISO, Ben Corll, shares his views. →
0
1
3
0
1
4
@CyberOutlook
Cyber Outlook
1 year
@4n6lady Besides the other great points, it's easy to get overwhelmed by the amount of ever-changing trends, technologies and threats. Choosing specific objectives to focus on, for your work and training, is very important. Many efforts are left half-baked, so see it through to the end!
1
0
4
@CyberOutlook
Cyber Outlook
2 years
Check out the latest Cyber Outlook Rundown: A Cybersecurity briefing on noteworthy Cyber Attacks, Vulnerabilities, and InfoSec news. #cybersecurity #infosec #cyberattack #security #tech
Tweet media one
0
2
4
@CyberOutlook
Cyber Outlook
1 year
Be more proactive, do what you can to prepare for and anticipate these attacks. #cybersecurity #infosec #cyberattack
@SecurityWeek
SecurityWeek
1 year
Using Threat Intelligence to Get Smarter About Ransomware
0
4
7
1
0
4
@CyberOutlook
Cyber Outlook
1 year
Setting proper expectations is incredibly important at all levels, from help desk engineers, to CISOs. Always keep it in mind when communicating with customers, end-users or team members. Avoids a lot of potential headaches! #cybersecurity #infosec #tech #softskills
@DarkReading
Dark Reading
1 year
Be that CISO: tips to succeed in today's hectic cyber climate.
0
3
9
0
0
4
@CyberOutlook
Cyber Outlook
2 years
In part with having an incident response plan, having a sound crisis management platform for communication is critical to ensure everyone is aware of the incident, the extent of the impact and what actions to take. Check this out for more info. #cybersecurity #security
@CywareCo
Cyware
2 years
It is imperative for companies to respond quickly when a crisis ⚠️ occurs. With a mobile-enabled📱information sharing platform, orgs can deliver steady real-time communication to stakeholders ▶️ #crisiscommunication #incidentresponse
0
0
1
0
0
3
@CyberOutlook
Cyber Outlook
2 years
Check out these great Cybersecurity Podcasts to get your daily dose of security news and trends. There are interesting interviews and engaging discussions on security topics and debates you can listen to. #Cybersecurity #Tech #Security
0
1
4
@CyberOutlook
Cyber Outlook
2 years
Check out today's Cyber Outlook Rundown A Cybersecurity briefing on noteworthy Cyber Attacks, Vulnerabilities, and InfoSec news. #cybersecurity #infosec #cyber #security #tech
Tweet media one
0
0
4
@CyberOutlook
Cyber Outlook
2 years
"Rarely do we find men who willingly engage in hard, solid thinking. There is an almost universal quest for easy answers and half-baked solutions. Nothing pains some people more than having to think." Martin Luther King, Jr. #MLKDay2023
@DeptofDefense
Department of Defense 🇺🇸
2 years
A day on, not a day off. Today, we celebrate the life and legacy of Dr. Martin Luther King Jr. as a national day of service. How are you honoring #MLKDay ?
Tweet media one
94
196
824
0
1
4
@CyberOutlook
Cyber Outlook
2 years
CISSP, CCISO and CISM are among the top certifications for cybersecurity management, leadership and strategic guidance. The CISSP is great because it combines mgmt with key technical aspects. I personally like the CISSP/CISM combo for additional mgmt focus. #cybersecurity #ciso
@TechTargetNews
TechTarget News
2 years
3 best professional certifications for CISOs and aspiring CISOs
0
0
3
0
1
3
@CyberOutlook
Cyber Outlook
2 years
Check out these new cybersecurity recommendations created to supplement NIST's CSF. I like the structure used, it's very clean and concise. Applies to everyone but great for SMBs. Here is the direct link to the document.
@DHSgov
Homeland Security
2 years
BIG news for cyber! Today, DHS, through @CISAgov , released the Cybersecurity Performance Goals that provide critical infrastructure owners & operators with a way to prioritize their efforts & investments toward the most impactful cybersecurity measures:
Tweet media one
12
17
48
0
1
3
@CyberOutlook
Cyber Outlook
2 years
Excellent resource for people learning cybersecurity, we reference SANS articles and whitepapers often. #learncyber #cybercareer
@SANSInstitute
SANS Institute
2 years
Looking for #FreeResources to help you get started on your path towards a career in #cybersecurity ? Our New2Cyber page shares webcasts, blogs & more to help you get started on your journey:
Tweet media one
0
6
15
0
0
3
@CyberOutlook
Cyber Outlook
1 year
Check out these videos from SANS covering some in-depth network security topics. Very helpful! #cybersecurity #infosec #networking #networksecurity
@SANSDefense
SANS Cyber Defense 🧢
1 year
Want to understand networks and network traffic better? Check out @johullrich 's #PacketTuesday video series ▶️
Tweet media one
0
4
11
0
0
3
@CyberOutlook
Cyber Outlook
2 years
If you are using Microsoft Cloud services, you should be familiar with and leveraging Conditional Access Policies to improve your access controls and work towards a Zero Trust architecture. #cybersecurity #cloudsecurity #zerotrust #infosec
Tweet media one
0
0
3
@CyberOutlook
Cyber Outlook
2 years
It's important to stay up on new threats and attack trends. Planning to attend this in Nov, should be very informative.
@DarkReading
Dark Reading
2 years
Understanding Cyber Attackers & Their Methods | A Dark Reading Virtual Event Do you know which attacks are most likely to be used against an organization like yours, and which attackers are most likely to target you? Register today to join us>>
Tweet media one
1
3
6
0
0
3
@CyberOutlook
Cyber Outlook
2 years
Zero-trust is a popular topic in Cybersecurity but many organizations still do not understand the architecture and design or the solutions available. This is a great resource to check out and learn more about this. #cybersecurity #zerotrust
@cloudsa
CloudSecurityAlliance
2 years
CSA’s Zero Trust Resource Hub is live and open for content submissions! This hub can be a go-to resource for your questions, concerns, and conversation about #ZeroTrust . Interested in contributing? Submit your Zero Trust content through this link →
0
2
4
0
0
3