dunsany (@dunsany) 's Twitter Profile
dunsany

@dunsany

Cybersec - Author of Heidi Geek Girl Detective (fiction) and IT Security Risk Control Management (non-fiction). Currently GRC in FinTech

ID: 14622910

linkhttp://www.planetheidi.com/ray.html calendar_today02-05-2008 05:26:03

5,5K Tweet

1,1K Followers

1,1K Following

F5 Labs (@f5labs) 's Twitter Profile Photo

Cyberattacks evolved in 2021, just like they do every year. Ransomwareโ€™s up, but thatโ€™s not the only thing that changed this year. Learn more in the 2022 Application Protection Report: In Expectation of Exfiltration. go.f5.net/mcj7kw

Cyberattacks evolved in 2021, just like they do every year. Ransomwareโ€™s up, but thatโ€™s not the only thing that changed this year. Learn more in the 2022 Application Protection Report: In Expectation of Exfiltration. go.f5.net/mcj7kw
F5 Labs (@f5labs) 's Twitter Profile Photo

Just like malicious insiders, some applications start out innocuous but can unexpectedly turn malicious. Assume the worst and cage them before they go bad. dunsany shares the details. go.f5.net/g3an2k

Just like malicious insiders, some applications start out innocuous but can unexpectedly turn malicious. Assume the worst and cage them before they go bad. <a href="/dunsany/">dunsany</a> shares the details. go.f5.net/g3an2k
Geraldine Just Follow TheEverywhereist on Threads (@everywhereist) 's Twitter Profile Photo

"Allowing hate and toxicity on a platform actually causes more damage to free speech as groups self-censor and leave platforms in response to abuse." I wrote about how Elon is using free speech as a thinly-veiled excuse to allow abusers free reign. bit.ly/1stExcuse

F5 Labs (@f5labs) 's Twitter Profile Photo

A look at multi-cloud security strategies, including the emerging practices of omni-cloud, functions as a service, containers as a service, cloud security posture management, and data sovereignty. dunsany with therealcipherking and Lori MacVittie go.f5.net/yq33dz

A look at multi-cloud security strategies, including the emerging practices of omni-cloud, functions as a service, containers as a service, cloud security posture management, and data sovereignty. <a href="/dunsany/">dunsany</a> with <a href="/therealcipherk1/">therealcipherking</a> and <a href="/lmacvittie/">Lori MacVittie</a> go.f5.net/yq33dz
dunsany (@dunsany) 's Twitter Profile Photo

Trying to explain types of cyber risk to c-levels: Adversarial risk: hacker shoots you in the foot, IT operational risk: you shoot yourself in the foot.

dunsany (@dunsany) 's Twitter Profile Photo

Watching the heron hunting in my pondโ€ฆ makes me think: whatโ€™s it like to be a frog? gimpasaura.blogspot.com/2015/03/bring-โ€ฆ

dunsany (@dunsany) 's Twitter Profile Photo

Woo-hoo, the documentary on Russian hackers (by Russian film makers) that I was interviewed for a year ago is out. imdb.com/title/tt185733โ€ฆ

Woo-hoo, the documentary on Russian hackers (by Russian film makers) that I was interviewed for a year ago is out. imdb.com/title/tt185733โ€ฆ
Digital Eclipse (@digitaleclipse) 's Twitter Profile Photo

Star Raiders is an all-time classic for Atari computers and the 5200. Mike Mika took the #Atari50 version one step further with a functional HUD, improved UI and more. Play it in November as part of Atari 50: The Anniversary Celebration.