Ely Kahn (@elykahn) 's Twitter Profile
Ely Kahn

@elykahn

VP Product at SentinelOne. x-AWS. Co-founder of threat hunting startup, Sqrrl (acquired by AWS); x-Dir of Cybersecurity at White House

ID: 13616232

linkhttps://www.linkedin.com/in/elykahn calendar_today18-02-2008 09:32:53

1,1K Tweet

2,2K Followers

2,2K Following

SentinelOne (@sentinelone) 's Twitter Profile Photo

🏭 In May, SentinelLabs has investigated a supply-chain attack against the Rust development community that we refer to as ‘CrateDepression’. Learn more sentinelone.com/labs/cratedepr… SentinelLabs #infosec #cybersecurity #supplychain

SentinelOne (@sentinelone) 's Twitter Profile Photo

☁️ In this post, learn how threat actors compromise enterprise cloud assets and how your organization can defend against them. By Tom Hegel. Read the blog: sentinelone.com/blog/threat-la… #cybersecurity #cloud #cloudsecurity #threatactors

SentinelOne (@sentinelone) 's Twitter Profile Photo

🚀Announcing SentinelOne's Q3 FY23 results. Triple-digit ARR and revenue growth. Margin progress. Enterprise success. With a difficult macro backdrop, we continue winning. We continue innovating. investors.sentinelone.com/press-releases… $S #cyber

🚀Announcing SentinelOne's Q3 FY23 results. Triple-digit ARR and revenue growth. Margin progress. Enterprise success. With a difficult macro backdrop, we continue winning. We continue innovating. 
investors.sentinelone.com/press-releases…
$S #cyber
SentinelOne (@sentinelone) 's Twitter Profile Photo

🧵 Everyone’s chatting about 🤖#ChatGPT. Here are 11 things it can do for #malware analysts, #security researchers, and #reverse engineers. A thread >>👇 🧵 1/13

SentinelOne (@sentinelone) 's Twitter Profile Photo

🌩️ Seen in the wild: Threat actors target #AWS login credentials with phishing websites and malverts returned in #Google web searches. By Tom Hegel sentinelone.com/blog/cloud-cre…

SentinelOne (@sentinelone) 's Twitter Profile Photo

🌩️ Threat actors were recently seen in the wild targeting #AWS login credentials with phishing websites and malverts returned in #Google web searches. By Tom Hegel Read the blog post: sentinelone.com/blog/cloud-cre…

SentinelOne (@sentinelone) 's Twitter Profile Photo

🌤 Read our latest blog featuring Ely Kahn, as he breaks down the 3 primary vectors of initial access used by threat actors to compromise #cloud resources, the risks associated with hybrid & multi-cloud environments, & more sentinelone.com/blog/staying-s… #cloudsecurity #cybersecurity

SentinelOne (@sentinelone) 's Twitter Profile Photo

🐝 The eBPF framework delivers a powerful combination of Linux kernel visibility and stability, making it ideally suited for cloud workload protection platforms (CWPP). Watch this webinar to learn what eBPF is, how it works, and its significance to CWPP: sentinelone.com/resources/the-…

🐝 The eBPF framework delivers a powerful combination of Linux kernel visibility and stability, making it ideally suited for cloud workload protection platforms (CWPP). 

Watch this webinar to learn what eBPF is, how it works, and its significance to CWPP: sentinelone.com/resources/the-…
SentinelOne (@sentinelone) 's Twitter Profile Photo

🌥️ 🔥 Announcing new SentinelOne products to help detect and prevent the spread of malware across hybrid cloud networks. sentinelone.com/press/sentinel… 👉 SentinelOne’s Cloud Data Security product line and the general availability of the first two products within it: Threat Detection

🌥️ 🔥 Announcing new SentinelOne products to help detect and prevent the spread of malware across hybrid cloud networks. sentinelone.com/press/sentinel…
👉 SentinelOne’s Cloud Data Security product line and the general availability of the first two products within it: Threat Detection
SentinelOne (@sentinelone) 's Twitter Profile Photo

🤖“Purple AI, am I being targeted by a particular threat actor? Do I have signs of a particular TTP?” Queries with SentinelOne’s new integrative generative AI can be that broad and conversational, Ely Kahn, VP, Product Management for Cloud Security, explains on a recent episode

AG (@aghamilton29) 's Twitter Profile Photo

The accounts coming out from the music festival are horrific. They need to be shared. The world needs to know the evil that innocent people faced this weekend. Here is one account from one of the survivors May Hayat (part 1/2): So I went to work with my girlfriend Liron at

The accounts coming out from the music festival are horrific. They need to be shared. The world needs to know the evil that innocent people faced this weekend. 

Here is one account from one of the survivors May Hayat (part 1/2): 

So I went to work with my girlfriend Liron at
SentinelOne (@sentinelone) 's Twitter Profile Photo

🔐 Learn how our Static AI Engine works to protect your systems. In this blog post, get an in-depth look at how our real-time Cloud Workload Protection Platform (CWPP) uses AI to deliver real-time detection and response to runtime threats. Read more: sentinelone.com/blog/decryptin…

SentinelOne (@sentinelone) 's Twitter Profile Photo

🌥️ Cloud-native application protection platform (CNAPP) PingSafe (Now a Part of SentinelOne), which we completed the acquisition of today, represents an important part of SentinelOne’s cloud security future. In our latest blog post by Ely Kahn, learn how AI-Powered cloud native security provides rapid

🌥️ Cloud-native application protection platform (CNAPP) <a href="/PingsafeAI/">PingSafe (Now a Part of SentinelOne)</a>, which we completed the acquisition of today, represents an important part of SentinelOne’s cloud security future. In our latest blog post by <a href="/ElyKahn/">Ely Kahn</a>, learn how AI-Powered cloud native security provides rapid
Cloud Security Podcast (@cloudsecpod) 's Twitter Profile Photo

🔒Can AI improve the workflow of Security Analysts? 🎙️Next episode drops tomorrow on our other Podcast, AI Cybersecurity where Caleb Sima and Ashish Rajan 🤴🏾 speak to Ely Kahn , VP of Product at SentinelOne about challenges + solutions of integrating AI tools into cybersecurity

🔒Can AI improve the workflow of Security Analysts? 

🎙️Next episode drops tomorrow on our other Podcast, AI Cybersecurity where <a href="/csima/">Caleb Sima</a>  and <a href="/hashishrajan/">Ashish Rajan 🤴🏾</a>  speak to <a href="/ElyKahn/">Ely Kahn</a> , VP of Product at <a href="/SentinelOne/">SentinelOne</a>  about challenges + solutions of integrating AI tools into cybersecurity
VMblog (@vmblog) 's Twitter Profile Photo

.SentinelOne's Purple AI is a must-see at #RSAC. "By allowing users to automate response and take action without the need for coding skills and process and analyze petabytes of data in near-real time, Purple AI radically simplifies security operations and empowers defenders in

.<a href="/SentinelOne/">SentinelOne</a>'s Purple AI is a must-see at #RSAC. "By allowing users to automate response and take action without the need for coding skills and process and analyze petabytes of data in near-real time, Purple AI radically simplifies security operations and empowers defenders in
SentinelOne (@sentinelone) 's Twitter Profile Photo

“By understanding how attackers operate, we can preemptively block their tactics and strategies," Ely Kahn, our VP of Product Management for Cloud Security, AI/ML, and Core Platform, tells Tony Bradley. "The future of cloud security must evolve from simply detecting to

Cloud Security Podcast (@cloudsecpod) 's Twitter Profile Photo

📈 What are the trends in Cloud Security Threats in 2024? 📊 We asked Ely Kahn , VP of Product Management at SentinelOne 🔹 Ransomware is getting smarter 🤖💥 🔹 Supply chain attacks on the rise 🔗🔒 🔹 2023 saw a 78% increase in data breaches 📈 #CloudSecurityThreats

Ely Kahn (@elykahn) 's Twitter Profile Photo

Back to the future... William Shatner carrying out a prompt injection attack against an agentic ai system… air date: March 8, 1968 youtu.be/8ixabejG0O0 #startrek