Cory Scott (@cory_scott) 's Twitter Profile
Cory Scott

@cory_scott

bsky.app/profile/corysc…

ID: 15502186

linkhttps://www.linkedin.com/in/coryscottlinkedin/ calendar_today20-07-2008 14:10:15

1,1K Tweet

1,1K Followers

672 Following

Sommer Panage (@sommer) 's Twitter Profile Photo

I am SO proud of Apple for publishing this guide on device and data access for personal safety. I hope this might help anyone dealing with intimate partner surveillance or stalking by someone you trusted. manuals.info.apple.com/MANUALS/1000/M…

Cory Scott (@cory_scott) 's Twitter Profile Photo

While I miss running into old friends and making new ones, I am enjoying my Defcon day with multiple village streams going on, popping in and out of talks, playing CTFs, and all from the comfort of home...

Cory Scott (@cory_scott) 's Twitter Profile Photo

A critical point. Apple is building a bulwark to resist more intrusive and disruptive regulation. They were on incredibly shaky ground before this announcement. They've likely bought themselves years of negotiation time with this move.

Cory Scott (@cory_scott) 's Twitter Profile Photo

His work on computer crime research was way ahead of its time. He wrote a book on Computer Crime in 1976 (!). ojp.gov/ncjrs/virtual-…

Cory Scott (@cory_scott) 's Twitter Profile Photo

A reminder to all security and privacy professionals about our obligation and duty to stand up and “shout from the cheap seats”.

Cory Scott (@cory_scott) 's Twitter Profile Photo

After the third Smiths track within a single hour during our Valentine's dinner out, I had to give it up for the mad lad who crafted the playlist. Well played.

Cory Scott (@cory_scott) 's Twitter Profile Photo

How many concurrent Google Calendar chimes does it take before you realize you need to close some tabs? My office sounds like an arcade at 10 minutes before every hour.

Cory Scott (@cory_scott) 's Twitter Profile Photo

"Cybersecurity professionals cannot collectively sustain a model where most of their resources are spent reacting to emerging problems like a steady stream of vulnerabilities." A sobering stare-into-the-abyss moment in the CSRB log4j report. cisa.gov/sites/default/…

"Cybersecurity professionals cannot collectively sustain a model where most of their resources are spent reacting to emerging problems like a steady stream of vulnerabilities." A sobering stare-into-the-abyss moment in the CSRB log4j report. cisa.gov/sites/default/…
Confluent (@confluentinc) 's Twitter Profile Photo

Meet Rob Stucke, an Information Security Engineer on our Detection Response Engineering Team! 👋 We sat down with Rob to hear all about his day-to-day as well as what he and his team are building. Want to get involved? Check out our openings! 👉 cnfl.io/444uJB8