Paul Ferrillo (@paulferrillo) 's Twitter Profile
Paul Ferrillo

@paulferrillo

CyberAvenger, #Infosec specialist; Incident responder, Corp. Governance Advisor and D&O liability expert. Views are my own

ID: 292458563

linkhttp://www.gtlaw.com calendar_today03-05-2011 17:43:51

10,10K Tweet

876 Followers

308 Following

Mathew Schwartz (@mathewjschwartz) 's Twitter Profile Photo

The state of #ransomware: “If this is the new normal, they are winning,” Paul Ferrillo tells the The Observer. “These criminal actors are well-funded and smart whether they are state-funded or not. We need to be as smart as they are.” theguardian.com/technology/202… #infosec

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

The sad truth about work is that 97% of the victims don’t have a blue team, no SIEM, no SOC and don’t monitor Twitter for new threats They have an admin or IT service provider that manages users, mail boxes, installs printers & once in a while a new AV

Chuck Brooks (@chuckdbrooks) 's Twitter Profile Photo

Please see (and kindly consider sharing) my latest FORBES article: "Ransomware on a Rampage; A New Wake Up Call" Thank you and have a great weekend! Chuck Brooks forbes.com/sites/chuckbro… #cybersecurity #ransomwareattacks #ransomwareprotection #ransomware

Paul Ferrillo (@paulferrillo) 's Twitter Profile Photo

T-Mobile CEO apologizes for massive hack, announces cybersecurity deal with Mandiant | ZDNet zdnet.com/article/t-mobi… "We spend lots of time and effort to try to stay a step ahead of them, but we didn't live up to the expectations we have for ourselves to protect our customers.

Paul Ferrillo (@paulferrillo) 's Twitter Profile Photo

The #Cyber War on our #Critical #Infrastructure and How to Win - Infosecurity Magazine #network #segmentation critical to success. Don’t let them have access to IT and OT at the same time. infosecurity-magazine.com/opinions/cyber…

Paul Ferrillo (@paulferrillo) 's Twitter Profile Photo

UNM Health alerts patients about major #cybersecurity attack kob.com/albuquerque-ne… The #healthcare provider is now sending a letter to patients whose personal information may have been hacked. It announced the security breach with a video posted on its website last month.

Paul Ferrillo (@paulferrillo) 's Twitter Profile Photo

Zero trust and cybersecurity: Here's what it means zd.net/3n8kxou via @ZDNet & Liam Tung Zero trust is the idea of removing inherent trust from the network. Just because a device is within the internal "trusted" side of a firewall or VPN, it should not be trusted by default

Paul Ferrillo (@paulferrillo) 's Twitter Profile Photo

ICS Vulnerabilities Increased by 41% In Six Months Amidst High Profile Attacks on Critical Infrastructure cpomagazine.com/cyber-security… via CPO Magazine Claroty’s biannual Report found that reported ICS vulnerabilities in the first half of 2021 had increased by 41%.

Paul Ferrillo (@paulferrillo) 's Twitter Profile Photo

Join us for this exclusive discussion with America finest #cybersecurity experts to explore how the #cyber basics can steady the course of America’s natonal cybersecurity posture. seyfarth.com/news-insights/…

Paul Ferrillo (@paulferrillo) 's Twitter Profile Photo

Top 10 #CyberSecurity Threats datamation.com/security/cyber… via Datamation.com #Ransomware and as-a-service attacks #RAAS Enterprise security tool sprawl Misconfigured security applications at scale Sophisticated #spear #phishing strategies

Paul Ferrillo (@paulferrillo) 's Twitter Profile Photo

With a structured executive learning experience and Accenture’s leadership, we’re strengthening every corporate director’s ability to govern these risks effectively and we’re also documenting their development on these issues. This is about making a... businesswire.com/news/home/2021…

Paul Ferrillo (@paulferrillo) 's Twitter Profile Photo

Global #Cyberattacks from Nation-State Actors: threatpost.com/global-cyberat… via Threatpost. We have seen an increase in attacks by nation-states, such as the Russian attack on #SolarWinds, and seen their attack tactics shift from targeted, stealthy operations into opportunistic hacks

Ron Ross (@ronrossecure) 's Twitter Profile Photo

We are in danger of raising a generation of kids who know how to use smart phones, but not how to build them. STEM is the foundation for cybersecurity. STEM skill shortages = cybersecurity skill shortages. Let’s encourage the next generation to pursue STEM careers. #STEM #NextGen

We are in danger of raising a generation of kids who know how to use smart phones, but not how to build them. STEM is the foundation for cybersecurity. STEM skill shortages = cybersecurity skill shortages. Let’s encourage the next generation to pursue STEM careers. #STEM #NextGen
Joseph Marks (@joseph_marks_) 's Twitter Profile Photo

If this story had even the slightest cyber angle it would be in tomorrow's Cybersecurity 202. washingtonpost.com/home/2022/01/0…