Clay Keller (@clay_keller) 's Twitter Profile
Clay Keller

@clay_keller

IT Security, Threat Intelligence, Vulnerability Management, container security, cloud security, MBA, SSL/TLS, 20 years at Walmart, 5 at Oracle, Views my own.

ID: 43615059

linkhttp://www.claykeller.com/ calendar_today30-05-2009 23:30:30

2,2K Tweet

602 Takipçi

888 Takip Edilen

Qualys (@qualys) 's Twitter Profile Photo

#Qualys is expanding its security and compliance capabilities for OCI (Oracle Cloud Infrastructure) and extending capabilities by integrating with OCI Vulnerability Scanning Service (VSS). erp.today/qualys-tighten…

Oracle APEX (@oracleapex) 's Twitter Profile Photo

Building a SaaS app with Low-Code in 4 months & scaling across multiple countries 🚀 youtube.com/watch?v=LonKUH… #orclAPEX #LowCode #Oracle

Simon Coter (@scoter80) 's Twitter Profile Photo

Oracle is committed to Linux freedom. Oracle makes the following promise: as long as Oracle distributes Linux, Oracle will make the binaries and source code for that distribution publicly and freely available! oracle.com/news/announcem… #oracle #oraclelinux Jeff Geerling #redhat

IT-ISAC (@itisac) 's Twitter Profile Photo

Security leaders from our #CSaaS Special Interest Group released a white paper on Secure by Default this week! Check it out and share → bit.ly/csaasdefault #securebydefault #SaaS #cybersecurity #security

Security leaders from our #CSaaS Special Interest Group released a white paper on Secure by Default this week!

Check it out and share → bit.ly/csaasdefault

#securebydefault #SaaS #cybersecurity #security
Oracle Cloud (@oraclecloud) 's Twitter Profile Photo

#Oracle Database@Azure is now available in the Microsoft East Region! Get step-by-step instructions for how to procure, deploy, and manage your service through the #Azure portal, then use Azure developer tools, SDKs, and APIs with the service. social.ora.cl/6018RRbYp

#Oracle Database@Azure is now available in the <a href="/Microsoft/">Microsoft</a>  East Region! Get step-by-step instructions for how to procure, deploy, and manage your service through the #Azure portal, then use Azure developer tools, SDKs, and APIs with the service. social.ora.cl/6018RRbYp
Phosphorus (@phosphorusinc) 's Twitter Profile Photo

Follow the factsheet! Defend against IoT & OT #cyberattacks with actions from Phosphorus, including -Risk assessments and vulnerability profiling -Configuration management -Automated password rotation -Patch management -Complete, accurate inventories w/risk profiling

Galvanick (@galvanickco) 's Twitter Profile Photo

Galvanick is hiring an OT-specific threat hunter / analyst. You'll be working with our engineering team to create a faster defensive OODA-Loop for our customers. If you know anybody who might be interested, please reach out.

Qualys (@qualys) 's Twitter Profile Photo

DeepSeek fails more than 50% of Jailbreak Tests by Qualys TotalAI: model failed 58% of jailbreak tests & 61% of security assessments. 🔎 Read the blog & learn how Qualys TotalAI helps secure AI models against threats. bit.ly/42Cubo0 #AI #CyberSecurity #LLMSecurity

DeepSeek fails more than 50% of Jailbreak Tests by Qualys TotalAI: model failed 58% of jailbreak tests &amp; 61% of security assessments.

🔎 Read the blog &amp; learn how Qualys TotalAI helps secure AI models against threats.  bit.ly/42Cubo0

 #AI #CyberSecurity #LLMSecurity
Clay Keller (@clay_keller) 's Twitter Profile Photo

People are paying 50K for 50 year old tractors these days because 1) They are simple 2) Easy to fix 3) They just work 4) Aren’t held hostage by the dealer for services. These aren’t collectors item prices. These are just for getting work done.

Cybersecurity and Infrastructure Security Agency (@cisagov) 's Twitter Profile Photo

Unsophisticated cyber actors target organizations with poor cyber hygiene. Our new fact sheet with FBI & other USG partners identifies five primary mitigations critical infrastructure orgs can implement to protect OT & ICS systems: go.dhs.gov/w8o

Unsophisticated cyber actors target organizations with poor cyber hygiene. Our new fact sheet with <a href="/FBI/">FBI</a> &amp; other USG partners identifies five primary mitigations critical infrastructure orgs can implement to protect OT &amp; ICS systems: go.dhs.gov/w8o
Phosphorus (@phosphorusinc) 's Twitter Profile Photo

5 Billion and Counting: How Phosphorus is Illuminating the Dark Corners of Enterprise Networks: Commemorating scanning our 5 Billionth customer IP. phosphorus.io/5-billion-and-…

Tenable (@tenablesecurity) 's Twitter Profile Photo

🛡️ #CISA stresses that an asset inventory is the foundation for OT security 🔐 #NIST has finalized cryptographic algorithms for resource-constrained devices 🤖 NIST is also developing control overlays for #AI systems Read the Snapshot: spr.ly/6015fS72t

Stephen Miller (@stephenm) 's Twitter Profile Photo

The issue before is now is very simple and clear. There is a large and growing movement of leftwing terrorism in this country. It is well organized and funded. And it is shielded by far-left Democrat judges, prosecutors and attorneys general. The only remedy is to use legitimate