Source2Create (@source2c) 's Twitter Profile
Source2Create

@source2c

Experienced, creative & innovative minds, delivering end-to-end solutions with ingenuity, transparency, originality, at a cost effective price.

ID: 1217997408501551105

linkhttps://linktr.ee/source2createptyltd calendar_today17-01-2020 02:29:56

949 Tweet

123 Takipçi

276 Takip Edilen

Source2Create (@source2c) 's Twitter Profile Photo

🔍 Cybercrime isn’t just lone hackers in hoodies — it’s big business. From malware marketplaces to 24/7 ransomware support, Cybercrime as a Service is booming. Read Amanda - Jane Turner’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com

🔍 Cybercrime isn’t just lone hackers in hoodies — it’s big business. From malware marketplaces to 24/7 ransomware support, Cybercrime as a Service is booming. 

Read Amanda - Jane Turner’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

From tinkering with Kali Linux on an old laptop to becoming a Senior Security Analyst, Manahil Hasan proves that passion, persistence, shapes real cybersecurity careers. 💻 Read Manahil Hasan’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com

From tinkering with Kali Linux on an old laptop to becoming a Senior Security Analyst, Manahil Hasan proves that passion, persistence, shapes real cybersecurity careers. 💻

Read Manahil Hasan’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

From political science to penetration testing, Omonivie Cynthia Jatto turned passion into breaking norms, and empowering young women along the way.💪 Read Omonivie Cynthia Jatto’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com

From political science to penetration testing, Omonivie Cynthia Jatto turned passion into breaking norms, and empowering young women along the way.💪 

Read Omonivie Cynthia Jatto’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

Ranee Bray didn’t set out to work in cybersecurity but her passion for strategic change and lifelong learning led her to where she could inspire transformation.🔐 Read Ranee Bray’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com

Ranee Bray didn’t set out to work in cybersecurity but her passion for strategic change and lifelong learning led her to where she could inspire transformation.🔐 

Read Ranee Bray’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

From action movies to action plans. Jordan Watson’s cybersecurity journey began with a spark of inspiration and grew into a thriving career. Read Jordan Watson’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com

From action movies to action plans. Jordan Watson’s cybersecurity journey began with a spark of inspiration and grew into a thriving career.

Read Jordan Watson’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

From golf caddy to cybersecurity leader 🏌️‍♀️ Kelly Johnson now leads Acronis ANZ and champions women in tech. “Cybersecurity is a great path for women. Read Kelly Johnson’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com

From golf caddy to cybersecurity leader 🏌️‍♀️ Kelly Johnson now leads Acronis ANZ and champions women in tech. “Cybersecurity is a great path for women. 

Read Kelly Johnson’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

💡 Theresa McCluskey's journey from transport to OT security proves it's never too late to grow, learn, and lead in cyber. Read Theresa McCluskey’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com

💡 Theresa McCluskey's journey from transport to OT security proves it's never too late to grow, learn, and lead in cyber. 

Read Theresa McCluskey’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

No plan. No strategy. No magic formula. Just guts, transferable skills, and a leap of faith. From teacher to cybersecurity awareness officer. Read Simon Carabetta’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com

No plan. No strategy. No magic formula. Just guts, transferable skills, and a leap of faith. From teacher to cybersecurity awareness officer.

Read Simon Carabetta’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

From curiosity to confidence, Sapna Kumari’s journey into cybersecurity proves that adaptability and continuous learning are more powerful than any set path. Read Sapna Kumari’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com

From curiosity to confidence, Sapna Kumari’s journey into cybersecurity proves that adaptability and continuous learning are more powerful than any set path.

Read Sapna Kumari’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

A HUGE THANK YOU TO Decipher Bureau! Your ongoing support makes it possible for us to bring this show-stopping event to the industry and our community. Thank you once again for sponsoring the 2025 Australian Women in Security Awards.

A HUGE THANK YOU TO Decipher Bureau!

Your ongoing support makes it possible for us to bring this show-stopping event to the industry and our community. Thank you once again for sponsoring the 2025 Australian Women in Security Awards.
Source2Create (@source2c) 's Twitter Profile Photo

“Don’t get too comfortable.” Min Kyriannis, CEO and cybersecurity leader, proves that staying curious, adaptable, and hungry to learn is the secret to thriving. Read Min Kyrianni’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com

“Don’t get too comfortable.” Min Kyriannis, CEO and cybersecurity leader, proves that staying curious, adaptable, and hungry to learn is the secret to thriving.

Read  Min Kyrianni’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

From Amazon to Cybersecurity Analyst, Disha Somashekar turned curiosity into purpose.✨ Read Disha Somashekar’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com

From Amazon to Cybersecurity Analyst, Disha Somashekar turned curiosity into purpose.✨

Read Disha Somashekar’s article in issue 25 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

Australian Women in Security Awards Tickets On Sale Now! Don't miss out on joining us for the 2025 Australian Women in Security Awards on the 2nd of September! Get your tickets here: womeninsecurityawards.com.au/tickets/

Australian Women in Security Awards Tickets On Sale Now!

Don't miss out on joining us for the 2025 Australian Women in Security Awards on the 2nd of September!
Get your tickets here: womeninsecurityawards.com.au/tickets/
Source2Create (@source2c) 's Twitter Profile Photo

ISSUE 26 LIVE NOW!! Women in Security Magazine Issue 26 - Are We There Yet? Where One conversation at a time, is how we change the world! Read Issue 26 of the Women in Security Magazine here: womeninsecuritymagazine.com

Source2Create (@source2c) 's Twitter Profile Photo

🚗 Are we there yet? A question that drives more than road trips—it fuels our journey toward equity and inclusion in the security industry. Read Abigail Swabey’s article in issue 26 of the women in security magazine here: womeninsecuritymagazine.com

🚗 Are we there yet? A question that drives more than road trips—it fuels our journey toward equity and inclusion in the security industry. 

Read Abigail Swabey’s article in issue 26 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

Inclusion isn’t about filling seats—it’s about redesigning the table. Madhuri Nandi urges the cyber industry to move beyond optics and build lasting change. Read Madhuri Nandi’s article in issue 26 of the women in security magazine here: womeninsecuritymagazine.com

Inclusion isn’t about filling seats—it’s about redesigning the table. Madhuri Nandi urges the cyber industry to move beyond optics and build lasting change. 

Read Madhuri Nandi’s article in issue 26 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

🔥 Burnout is hitting hard in the security industry—from alert fatigue to impossible workloads. But it’s not a personal failing. It’s a systemic issue we can address. Read Abigail Swabey’s article in issue 26 of the women in security magazine here: womeninsecuritymagazine.com

🔥 Burnout is hitting hard in the security industry—from alert fatigue to impossible workloads. But it’s not a personal failing. It’s a systemic issue we can address.

Read Abigail Swabey’s article in issue 26 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

🧠 Neurodiversity isn’t a buzzword—it’s a strategic advantage. Neurodivergent professionals are reshaping the future of security. Read Abigail Swabey’s article in issue 26 of the women in security magazine here: womeninsecuritymagazine.com

🧠 Neurodiversity isn’t a buzzword—it’s a strategic advantage. Neurodivergent professionals are reshaping the future of security.

Read Abigail Swabey’s article in issue 26 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

🔐 Cybercrime is booming—and your data is the target. Amanda-Jane Turner breaks down how data gets stolen and what you can do to stay safe. Read Amanda-Jane Turner’s article in issue 26 of the women in security magazine here: womeninsecuritymagazine.com

🔐 Cybercrime is booming—and your data is the target. Amanda-Jane Turner breaks down how data gets stolen and what you can do to stay safe.

Read Amanda-Jane Turner’s article in issue 26 of the women in security magazine here: womeninsecuritymagazine.com
Source2Create (@source2c) 's Twitter Profile Photo

From networking to frontline cyber defense, Purity Njeri Gachuhi carved her path with curiosity, community and courage. Read Purity Njeri Gachuhi's article in issue 26 of the women in security magazine here: womeninsecuritymagazine.com

From networking to frontline cyber defense, Purity Njeri Gachuhi carved her path with curiosity, community and courage. 

Read Purity Njeri Gachuhi's article in issue 26 of the women in security magazine here: womeninsecuritymagazine.com