James Coker(@ReporterCoker) 's Twitter Profileg
James Coker

@ReporterCoker

Deputy Editor at Infosecurity Magazine https://t.co/1qfYoZuBta

ID:1240331580461252613

calendar_today18-03-2020 17:37:59

1,5K Tweets

1,3K Followers

581 Following

Recorded Future(@RecordedFuture) 's Twitter Profile Photo

'Alexander Leslie, threat intelligence analyst at Recorded Future, told Infosecurity Magazine that this campaign is the most prominent example of a threat actor abusing legitimate services for targeting credentials across multiple platforms and architecture.'

account_circle
Beth Maundrill(@GunshipGirl) 's Twitter Profile Photo

Day two of about to begin!

Main news so far:

📗New best guidance aiming to reduce ransom payments infosecurity-magazine.com/news/uk-insura…

Day two of #CyberUK about to begin! Main news so far: 📗New best guidance aiming to reduce ransom payments infosecurity-magazine.com/news/uk-insura…
account_circle
Infosecurity Magazine(@InfosecurityMag) 's Twitter Profile Photo

Don't miss our upcoming webinar on May 16th with ProcessUnity, where our expert panel will dive deep into how to optimize third-party risk management programs through NIST CSF 2.0:
bit.ly/4ajnbfH

Don't miss our upcoming webinar on May 16th with @ProcessUnity, where our expert panel will dive deep into how to optimize third-party risk management programs through NIST CSF 2.0: bit.ly/4ajnbfH
account_circle
Infosecurity Magazine(@InfosecurityMag) 's Twitter Profile Photo

Just 3 weeks left until ! Join us at Europe’s top cybersecurity event featuring incredible keynote speakers:

High Performance Podcasters
F1 powerhouse Claire Williams OBE
AI expert Henry Ajder

Don’t miss out, register now! bit.ly/3WnB9Kj

Just 3 weeks left until #Infosec2024! Join us at Europe’s top cybersecurity event featuring incredible keynote speakers: High Performance Podcasters F1 powerhouse Claire Williams OBE AI expert Henry Ajder Don’t miss out, register now! bit.ly/3WnB9Kj
account_circle
James Coker(@ReporterCoker) 's Twitter Profile Photo

Always enjoy listening to this keynote session at - the five most dangerous new attacks. Really highlights the rapidly evolving threat landscape

Always enjoy listening to this keynote session at #RSAC - the five most dangerous new attacks. Really highlights the rapidly evolving threat landscape
account_circle
James Coker(@ReporterCoker) 's Twitter Profile Photo

Software security by design has been a huge focus at this year’s RSA Conference. There’s unique challenges to achieving this in open source software.

Read about three key ways secure by design practices can be incentivised in open source software development

account_circle
James Coker(@ReporterCoker) 's Twitter Profile Photo

It’s been great to hear more details about US government plans to shift the burden of software security away from end users to manufacturers during

Read here for the key components of this approach, part of the National Cybersecurity Strategy infosecurity-magazine.com/news/us-plans-…

account_circle
Infosecurity Magazine(@InfosecurityMag) 's Twitter Profile Photo

Change Healthcare Cyber-Attack: Inside the Disruption and the Lessons Learned infosecurity-magazine.com/podcasts/chang…

account_circle
James Coker(@ReporterCoker) 's Twitter Profile Photo

It was great to hear Recorded Future's Alexander Leslie discuss the changing nature of hacktivism earlier at .
Here's my write-up of his analysis, which shows hacktivism is becoming blurred with financial cybercrime and nation-state activities: infosecurity-magazine.com/news/hacktivis…

account_circle
James Coker(@ReporterCoker) 's Twitter Profile Photo

Lots of focus on US government efforts to strengthen software security by design early on at , including introducing liability for manufacturers.

A big component of the US National Cybersecurity Strategy.

account_circle
James Coker(@ReporterCoker) 's Twitter Profile Photo

Interesting new research on Day 1 of from IBM about the security and privacy risks of using generative AI tools in the workplace

account_circle
James Coker(@ReporterCoker) 's Twitter Profile Photo

Arrived for another Conference in sunny San Francisco! Looking forward to catching up with a lot of new and familiar faces over the next 4 days

Arrived for another #RSAC Conference in sunny San Francisco! Looking forward to catching up with a lot of new and familiar faces over the next 4 days
account_circle
Beth Maundrill(@GunshipGirl) 's Twitter Profile Photo

While James Coker and Kevin Poireault are at next week I'll be manning the fort solo at Infosecurity Magazine

I'll be knuckling down to prepare for CYBERUK and of course INFOSEC EUROPE! Events season in full swing.

account_circle
James Coker(@ReporterCoker) 's Twitter Profile Photo

The annual campaign remains highly relevant, with password compromise still the source of many cyber incidents and breaches.

Here are five relatively easy ways users' can dramatically reduce the risk of password compromise: infosecurity-magazine.com/news-features/…

account_circle
Beth Maundrill(@GunshipGirl) 's Twitter Profile Photo

The ICO has said persistent information breaches are failing people living with HIV

This comes as the Central YMCA is fined £7.5k for using CC and not BCC in an email to those participating in one of their programs

Quite the story - any commentary from cyber people please DM

account_circle
James Coker(@ReporterCoker) 's Twitter Profile Photo

April has been a hugely significant month in the cybersecurity vendor market, with numerous high-profile M&A deals being announced.

This includes Darktrace reaching an agreement to be sold to Thoma Bravo for $5.3bn

Read our April M&A roundup here: infosecurity-magazine.com/news-features/…

account_circle
Infosecurity Magazine(@InfosecurityMag) 's Twitter Profile Photo

Voter Registration System Taken Offline in Coffee County Cyber-Incident infosecurity-magazine.com/news/voter-reg…

account_circle