Mike Manrod (@croodsolutions) 's Twitter Profile
Mike Manrod

@croodsolutions

CISO and adjunct faculty, focused on finding problems and fixing them. The basics are still the most important aspect of a good security program.

ID: 1402385110939299843

calendar_today08-06-2021 22:01:03

5,5K Tweet

1,1K Followers

1,1K Following

NinjaOne (@ninjaone) 's Twitter Profile Photo

When disaster strikes, will your IT team cast the right spell or crash the server? 🧙‍♂️💥 Tabletop IT training meets D&D in Backups & Bandwidth! Catch the chaos (and learn something too) this Thursday at 1pm EDT feat. Tom🌶\(^-^)/🌶 infosec.exchange/@tomlawrence and others! 🎥 youtube.com/live/qj1EdIy7S…

Kimberley Mitnick (@kminx) 's Twitter Profile Photo

going thru Kevin Mitnick’s achievements over the years and this one is a keeper… forever proud. When he lectured at Harvard University Law school. Self taught and completed his GED while at Lompoc. People would often ask Kevin how to get started in cyber, his funniest and typical

going thru <a href="/kevinmitnick/">Kevin Mitnick</a>’s achievements over the years and this one is a keeper…
forever proud.

When he lectured at <a href="/Harvard/">Harvard University</a> Law school. 

Self taught and completed his GED while at Lompoc. People would often ask Kevin how to get started in cyber, his funniest and typical
Rob Fuller (@mubix) 's Twitter Profile Photo

Wanted to share that I just finished my MBA. Two graduate degrees, my undergrad and a CISSP. Now all I have to do is start attending RSA… ;)

Wanted to share that I just finished my MBA. Two graduate degrees, my undergrad and a CISSP. Now all I have to do is start attending RSA… ;)
spencer (@techspence) 's Twitter Profile Photo

Security hardening is the removal of dangerous configurations… Security hardening is often seen as adding layers of controls, however, it’s more similar to taking away or locking down things that could be misused by attackers… while still making sure everything works the way

HD Moore (@hdmoore) 's Twitter Profile Photo

I'm excited to announce our "Out-of-Band" series; focused on the security risks of management devices like BMCs, serial servers, and KVMs. "Out-of-Band, Part 1: The new generation of IP KVMs and how to find them" is now live at: runzero.com/blog/oob-p1-ip…

I'm excited to announce our "Out-of-Band" series;  focused on the security risks of management devices like BMCs, serial servers, and KVMs. "Out-of-Band, Part 1: The new generation of IP KVMs and how to find them" is now live at:
runzero.com/blog/oob-p1-ip…
spencer (@techspence) 's Twitter Profile Photo

One of the reasons I really like deception tech is because if done well it can be used to identify the permission level and logical location of a threat actor That’s not always the case for other security tools

Orange Cyberdefense's SensePost Team (@sensepost) 's Twitter Profile Photo

Adriaan was struggling to get an interactive shell on the *nix application server he had popped, so he wrote a turn-based mini binary to give you a semi-interactive shell in restrictive environments. Writeup & code 👇🧵

Adriaan was struggling to get an interactive shell on the *nix application server he had popped, so he wrote a turn-based mini binary to give you a semi-interactive shell in restrictive environments. Writeup &amp; code 👇🧵
𝚕𝚒𝚗𝚝𝚒𝚕𝚎 (@lintile) 's Twitter Profile Photo

Hey everyone, I’m emceeing the EFF benefit poker tournament at Planet Hollywood at DEF CON 33! Shenanigans for a cause… #DFIU eff.org/event/betting-…