Catherine Kim (@catherinesjkim) 's Twitter Profile
Catherine Kim

@catherinesjkim

Technical Customer Success Manager @GripSecurity

ID: 2865727549

linkhttps://grip.security calendar_today19-10-2014 19:43:04

11,11K Tweet

1,1K Followers

4,4K Following

Thomas Roccia ๐Ÿค˜ (@fr0gger_) 's Twitter Profile Photo

๐Ÿคฏ The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)! I hope it helps to make sense of the information out there. Please treat the information "as is" while the analysis

๐Ÿคฏ The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)! 

I hope it helps to make sense of the information out there. Please treat the information "as is" while the analysis
Alex Xu (@alexxubyte) 's Twitter Profile Photo

Roadmap for Learning Cyber Security By Henry Jiang. Redrawn by ByteByteGo. Cybersecurity is crucial for protecting information and systems from theft, damage, and unauthorized access. Whether you're a beginner or looking to advance your technical skills, there are numerous

Bytebytego (@bytebytego) 's Twitter Profile Photo

Top 12 Tips for API Security - Use HTTPS - Use OAuth2 - Use WebAuthn - Use Leveled API Keys - Authorization - Rate Limiting - API Versioning - Whitelisting - Check OWASP API Security Risks - Use API Gateway - Error Handling - Input Validation -- Subscribe to our weekly

Sahn Lam (@sahnlam) 's Twitter Profile Photo

Choosing the Right Database When deciding which type of database to use, it can be overwhelming to choose from the many available options. Here's a brief summary of some common database architectures and their use cases: - Relational databases: These are versatile and can solve

Choosing the Right Database

When deciding which type of database to use, it can be overwhelming to choose from the many available options. Here's a brief summary of some common database architectures and their use cases:

- Relational databases: These are versatile and can solve
Andrej Karpathy (@karpathy) 's Twitter Profile Photo

Returning from an experimental ~2 week detox from the internet. Main takeaway is that I didn't realize how unsettled the mind can get when over-stimulating on problems/information (like a stirred liquid), and ~2 weeks is enough to settle into a lot more zen state. I'm struck by

Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

John Strand has some wise words for us today: youtube.com/watch?utm_campโ€ฆ If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/prโ€ฆ

John Strand has some wise words for us today: youtube.com/watch?utm_campโ€ฆ 

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/prโ€ฆ
Sahn Lam (@sahnlam) 's Twitter Profile Photo

Session, cookie, JWT, token, SSO, and OAuth 2.0 - what are they? These terms relate to managing user identity when logging into websites. You declare who you are (identification), your identity is verified (authentication), and you're granted appropriate permissions

Session, cookie, JWT, token, SSO, and OAuth 2.0 - what are they?

These terms relate to managing user identity when logging into websites. You declare who you are (identification), your identity is verified (authentication), and you're granted appropriate permissions
Sahn Lam (@sahnlam) 's Twitter Profile Photo

Securing REST APIs It is important to make sure that only approved users and applications can access or make changes to resources in our API. Here are some common was to secure REST APIs: 1. ๐—•๐—ฎ๐˜€๐—ถ๐—ฐ ๐—”๐˜‚๐˜๐—ต๐—ฒ๐—ป๐˜๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป This sends a username and password with each

Securing REST APIs

It is important to make sure that only approved users and applications can access or make changes to resources in our API.

Here are some common was to secure REST APIs:

1. ๐—•๐—ฎ๐˜€๐—ถ๐—ฐ ๐—”๐˜‚๐˜๐—ต๐—ฒ๐—ป๐˜๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป

This sends a username and password with each
Lex Fridman (@lexfridman) 's Twitter Profile Photo

I visited xAI and Tesla supercomputer clusters in Memphis & Texas, and was blown away by the rapid rate of progress. It was fascinating to watch Elon & team constantly improve every aspect of the process. Also, as a human, it was a bit surreal (and humbling) to walk around

I visited xAI and Tesla supercomputer clusters in Memphis & Texas, and was blown away by the rapid rate of progress. It was fascinating to watch Elon & team constantly improve every aspect of the process.

Also, as a human, it was a bit surreal (and humbling) to walk around
Katia Ameri (@katiaameri) 's Twitter Profile Photo

โœจ๐ŸŒด Iโ€™m beyond excited that today kicks off our BIGGEST #LATechWeek yet! With over 600 events across AI, fundraising, SaaS, media & entertainment, and more, itโ€™s incredible to see the momentum building. The best part? Cross-pollination between local talent and those flying in