Jonathan Levine (@jonmlevine) 's Twitter Profile
Jonathan Levine

@jonmlevine

CTO/CIO/CISO, @Intermedia_net. @nytheatreballet BoD. ex-@rakutenjp, @IBM, PointCast, elsewhere. Monomath. Investor. Dad. pronoun.is/he

ID: 120499199

linkhttp://paper.li/JonMLevine/1494258264#/ calendar_today06-03-2010 16:28:30

13,13K Tweet

15,15K Followers

2,2K Following

Gabriel Bosslet (@gbosslet) 's Twitter Profile Photo

I’ve been a physician now for 20 years I’ve never seen polio Not once This is because of vaccines And in the 1950s leaders all realized the importance of public health We can get back to the mindset that we are all in this together

Eugene Wei (@eugenewei) 's Twitter Profile Photo

My friend sent me this pic from the Foster City Costco. Ah, that old reliable business model: lure them in with the $5 rotisserie chicken, then get them with the case of DRC for $44K.

My friend sent me this pic from the Foster City Costco. 

Ah, that old reliable business model: lure them in with the $5 rotisserie chicken,  then get them with the case of DRC for $44K.
Sridhar Vembu (@svembu) 's Twitter Profile Photo

1/ The man who did the most damage to American industry was Jack Welch, as the CEO of GE. The Boeing engineering disaster had roots in Welch's deeply flawed management doctrines which were spread across American industry by his acolytes. This has to be understood in India too.

Matt Johansen (@mattjay) 's Twitter Profile Photo

The Okta hack that keeps on giving! Cloudflare announced a new data breach today in it's continued battle against creds stolen during a previous Okta hack Let's dig in:

Olaf Hartong (@olafhartong) 's Twitter Profile Photo

Not sure when the AnyDesk signing cert was compromised, and if that’s the only thing that happened. This checks if you have AnyDesk binaries signed a week before the cert was revoked or later. 1/2

Halvar Flake (@halvarflake) 's Twitter Profile Photo

Given how strongly memory in humans is organized around spatial memory, and given that a common memory technique is storing facts in imagined spatial surroundings, the possibility for vision-pro like devices on reverse engineering and program understanding are vast.

Sheel Mohnot (@pitdesi) 's Twitter Profile Photo

An HK-based employee of a multinational firm wired out $25M after attending a video call where all employees were deepfaked, including the CFO. He first got an email which was suspicious but then was reassured on the video call with his “coworkers.”

An HK-based employee of a multinational firm wired out $25M after attending a video call where all employees were deepfaked, including the CFO.

He first got an email which was suspicious but then was reassured on the video call with his “coworkers.”
Emmett Shear (@eshear) 's Twitter Profile Photo

The AI Koans (from catb, no link bc broken cert). All of this has happened before and all of this will happen again. Learn from the past!

The AI Koans (from catb, no link bc broken cert). All of this has happened before and all of this will happen again. Learn from the past!
Kim Zetter (@kimzetter) 's Twitter Profile Photo

Newly discovered vuln in Apple M-series chips lets attackers extract secret keys from Macs. "The flaw—a side channel allowing end-to-end key extractions when Apple chips run...widely used cryptographic protocols—can’t be patched" arstechnica.com/security/2024/…

Daniel Woods (@ieltop) 's Twitter Profile Photo

Which security controls reduce cyber risk and by how much? Until recently, vendors tried to answer with peacock like competition, e.g. ever fancier marketing campaigns. Our new article is a step towards answering with empirical evidence.

Which security controls reduce cyber risk and by how much?

Until recently, vendors tried to answer with peacock like competition, e.g. ever fancier marketing campaigns.

Our new article is a step towards answering with empirical evidence.
Matt Johansen (@mattjay) 's Twitter Profile Photo

🧵 THREAD: A federal whistleblower just dropped one of the most disturbing cybersecurity disclosures I’ve ever read. He's saying DOGE came in, data went out, and Russians started attempting logins with new valid DOGE passwords Media's coverage wasn't detailed enough so I dug

🧵 THREAD: A federal whistleblower just dropped one of the most disturbing cybersecurity disclosures I’ve ever read.

He's saying DOGE came in, data went out, and Russians started attempting logins with new valid DOGE passwords

Media's coverage wasn't detailed enough so I dug