Aaron Rinehart (at 127.0.0.1) (@aaronrinehart) 's Twitter Profile
Aaron Rinehart (at 127.0.0.1)

@aaronrinehart

former CTO & Co-Founder, UHG, NASA, DHS. O'Reilly Co-Author on Security Chaos Engineering

ID: 34952760

linkhttps://www.youtube.com/watch?v=0T0IOXjL660 calendar_today24-04-2009 15:25:03

6,6K Tweet

2,2K Followers

4,4K Following

Kennedy (@run2obtain) 's Twitter Profile Photo

πŸ›‘οΈ Adversary Emulation Made Easy πŸ›‘οΈ Hasn't been as easy as this! Check it out and adopt a proactive security stance. 🀺 Run RED TEAMING and cloud PENTESTs when you want, under your terms, as often as you wish. πŸ‘‡ x.com/run2obtain/sta…

Kennedy (@run2obtain) 's Twitter Profile Photo

- No more waiting for months to run pentests. - No more paying huge consultancy bills. - No more looking for 10x offensive security folks. mitigant.io/en/blog/rethin…

Phil Venables (@philvenables) 's Twitter Profile Photo

Remember, as security professionals we are defending the free flow of ideas and capital that are essential for human progress. Defending lives and livelihoods. That's the mission. Happy Holidays. sketchplanations.com/the-three-bric…

Remember, as security professionals we are defending the free flow of ideas and capital that are essential for human progress. Defending lives and livelihoods. That's the mission. Happy Holidays.

sketchplanations.com/the-three-bric…
David Sacks (@davidsacks) 's Twitter Profile Photo

New report by leading semiconductor analyst Dylan Patel shows that DeepSeek spent over $1 billion on its compute cluster. The widely reported $6M number is highly misleading, as it excludes capex and R&D, and at best describes the cost of the final training run only.

Kennedy (@run2obtain) 's Twitter Profile Photo

🎊 We Made It Into The Google for Startups Growth Academy πŸŽ‰ I am thrilled Mitigant Β has been selected to join the prestigiousΒ Google or Startups Growth Academy: AI for CybersecurityΒ program! ⚑ This incredible achievement is a testament to the innovative cloud

🎊 We Made It Into The <a href="/Google/">Google</a> for Startups Growth Academy πŸŽ‰

I am thrilled <a href="/cyber_mitigant/">Mitigant</a> Β has been selected to join the prestigiousΒ <a href="/Google/">Google</a>  or Startups Growth Academy: AI for CybersecurityΒ program!

⚑  This incredible achievement is a testament to the innovative cloud
Kennedy (@run2obtain) 's Twitter Profile Photo

🀺 Leveraging GenAI for Security Incident Response πŸ›‘οΈ Check out how to use Amazon Bedrock to respond to security events on Amazon Web Services πŸ‘‡ x.com/run2obtain/sta…

Kennedy (@run2obtain) 's Twitter Profile Photo

🀺 Cloud Attack Emulation: Azure Monitor Logs Analysis with GenAI⚑ Lemme me tell you a story: one borne out of curiosity to explore GenAI capabilities, particularly security analysis! It all started with a prompt based on an attached document. The attached CSV document was a

🀺 Cloud Attack Emulation: Azure Monitor Logs Analysis with GenAI⚑

Lemme me tell you a story: one borne out of curiosity to explore GenAI capabilities, particularly security analysis! It all started with a prompt based on an attached document.

The attached CSV document was a
Omar Sanseviero (@osanseviero) 's Twitter Profile Photo

The Gemma team is hiring software engineers! πŸ’ŽπŸš€ πŸ€—Contribute to the family of open models from Google DeepMind πŸ”¨Build training, data, and analysis infrastructure 🧠From large-scale TPU to distillation Wanna apply? πŸ‘‡Deadline is March 14th boards.greenhouse.io/deepmind/jobs/…

Clint Gibler (@clintgibler) 's Twitter Profile Photo

πŸ€– π“πŒ-𝐁𝐞𝐧𝐜𝐑 - 𝐀 π›πžπ§πœπ‘π¦πšπ«π€ 𝐟𝐨𝐫 π‹π‹πŒ-π›πšπ¬πžπ π“π‘π«πžπšπ­ 𝐌𝐨𝐝𝐞π₯𝐒𝐧𝐠 Which LLMs are best at threat modeling? Where do they fall short? One of the most important aspects of using LLMs is proper *evaluations*. So I was excited to see this new

πŸ€– π“πŒ-𝐁𝐞𝐧𝐜𝐑 - 𝐀 π›πžπ§πœπ‘π¦πšπ«π€ 𝐟𝐨𝐫 π‹π‹πŒ-π›πšπ¬πžπ π“π‘π«πžπšπ­ 𝐌𝐨𝐝𝐞π₯𝐒𝐧𝐠

Which LLMs are best at threat modeling?

Where do they fall short?

One of the most important aspects of using LLMs is proper *evaluations*.

So I was excited to see this new
DevOpsDays DC (@devopsdaysdc) 's Twitter Profile Photo

Come to KCD Washington DC on September 16 and then stay for for DevOpsDays DC on September 17 and 18! Discounts if you buy tickets for both. devopsdays.org/events/2025-wa…

R6 Security - Phoenix (@phoenix_dns) 's Twitter Profile Photo

Pods don’t bleed logs β€” they leak models. Protect your inference stack before prompt injection finds you. Contact us to find out more - r6security.com/contact #LLMSecurity #PromptInjection #AIThreats

Noureldin Ehab | πŸ‡΅πŸ‡Έ (@nouureldin_ehab) 's Twitter Profile Photo

I had the pleasure of speaking at Amazon Web Services Cloud Day Turkey! This time, I talked about Security Chaos Engineering, how we can safely break things on purpose to build more resilient and secure systems.

I had the pleasure of speaking at <a href="/awscloud/">Amazon Web Services</a> Cloud Day Turkey!

This time, I talked about Security Chaos Engineering, how we can safely break things on purpose to build more resilient and secure systems.
@norootcause.surfingcomplexity.com on Bluesky (@norootcause) 's Twitter Profile Photo

New blog post, on the role of attrition in software incidents, and how we don't talk about that in incident write-ups: surfingcomplexity.blog/2025/11/02/you…

Kennedy (@run2obtain) 's Twitter Profile Photo

🌟Feature Release: AI-Powered Cloud Adversary Emulation🌟 Today, we shipped three features that solve the biggest complaints we hear from security teams. πŸŽ‰ The attached image shows how these three features work together. But what are these features? Let's dive in 🧡🧡 πŸ‘‡

🌟Feature Release: AI-Powered Cloud Adversary Emulation🌟

Today, we shipped three features that solve the biggest complaints we hear from security teams. πŸŽ‰

The attached image shows how these three features work together.  But what are these features? 

Let's dive in 🧡🧡 πŸ‘‡
Olympix (@olympix_ai) 's Twitter Profile Photo

There's a grave difference between preventing errors and managing them. If your security relies solely on the former, every unexpected error becomes a potential disaster. Incorporate chaos; let your systems fail in a sandbox to prevent them from failing in battle.