Cyber Outlook (@cyberoutlook) 's Twitter Profile
Cyber Outlook

@cyberoutlook

Helping people explore and navigate #Cybersecurity. We share #InfoSec news, knowledge and resources from experts. Founded by an active CISO & CISSP.

ID: 1549583370786447360

linkhttps://www.cyberoutlook.org/ calendar_today20-07-2022 02:34:18

686 Tweet

8,8K Followers

6,6K Following

SANS Institute (@sansinstitute) 's Twitter Profile Photo

Walk through the world of #DFIR from beginning to end together at #SANSSecWest 2023 on May 15. ➡️ Gain expert insight from SANS Senior Instructor @kevinripa & register to join Live Online: sans.org/u/1pBn SANS DFIR #SANSLiveTraining #ThinkDFIRently

Walk through the world of #DFIR from beginning to end together at #SANSSecWest 2023 on May 15.

➡️ Gain expert insight from SANS Senior Instructor @kevinripa & register to join Live Online: sans.org/u/1pBn

<a href="/sansforensics/">SANS DFIR</a> 

#SANSLiveTraining #ThinkDFIRently
SecurityWeek (@securityweek) 's Twitter Profile Photo

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation compared to a national company - securityweek.com/ciso-conversat…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

Stop attackers in their tracks with honeytokens – the new decoys in town. Check out this article on how they can help you enhance your intrusion detection capabilities. Read details: thehackernews.com/2023/05/why-ho… #cybersecurity #informationsecurity

Cyber Outlook (@cyberoutlook) 's Twitter Profile Photo

Until there are better security controls available, this needs to be managed and monitored carefully. That said, trying to forcefully slow down tech development is not good, so maybe this is better controlled by how it's released to the general public... #AI #cybersecurity #tech

Cyber Outlook (@cyberoutlook) 's Twitter Profile Photo

This is a very useful resource for building and managing security programs, download the free EA reference guide from CSA. #cybersecurity #infosec

SC Media (@scmagazine) 's Twitter Profile Photo

.Proofpoint researchers detail new techniques that could be abused in Microsoft Teams, including a way to replace meeting invites with malicious links. #cybersecurity #infosec #ITsecurity bit.ly/3MjqlpX

Health-ISAC (@healthisac) 's Twitter Profile Photo

Health-ISAC members receive finished reports on Physical security, one recent article explains that while the expanded use of telehealth services improved the overall adaptability of U.S. healthcare, bad actors have taken advantage of its rapid growth. prnewswire.com/news-releases/…

Health-ISAC members receive finished reports on Physical security, one recent article explains that while the expanded use of telehealth services improved the overall adaptability of U.S. healthcare, bad actors have taken advantage of its rapid growth. prnewswire.com/news-releases/…
Pierluigi Paganini - Security Affairs (@securityaffairs) 's Twitter Profile Photo

#CISA adds recently patched #Barracuda #zeroday to its Known Exploited Vulnerabilities catalog securityaffairs.com/146729/securit… #securityaffairs #hacking #malware

CyberSN (@cyber_sn) 's Twitter Profile Photo

☁️🔒 Cloud Security Engineers, is your salary aligned with the rest of the industry? Discover your career path options as well as the essential skills, certifications, and tools needed to take your career to the next level: hubs.la/Q01SM19X0 #cloudsecurityengineer

☁️🔒 Cloud Security Engineers, is your salary aligned with the rest of the industry? Discover your career path options as well as the  essential skills, certifications, and tools needed to take your career to the next level: hubs.la/Q01SM19X0
 #cloudsecurityengineer
Cyber Outlook (@cyberoutlook) 's Twitter Profile Photo

A good CISO should be willing and able to effectively hold a seat on the board. And everyone should get ready because the SEC, among other regulators, will be forcing the hand soon. #cybersecurity #infosec #ciso

SC Media (@scmagazine) 's Twitter Profile Photo

The U.S. Securities and Exchange Commission this week pushed back its timeline for finalizing new regulations that would require public companies to notify the agency within four days of a cybersecurity breach. #cybersecurity #infosec #ITsecurity bit.ly/3qIsggx

SC Media (@scmagazine) 's Twitter Profile Photo

The NSA/CSS is urging organizations to harden their systems against BlackLotus UEFI bootkit malware, warning there is “significant confusion” and a “false sense of security” regarding the threat it poses. #cybersecurity #infosec #ITsecurity bit.ly/3CHp7QY

The Hacker News (@thehackersnews) 's Twitter Profile Photo

Iranian-linked Agonizing Serpens APT group using novel wiper #malware and tactics to target Israeli education and tech sectors. Learn more: thehackernews.com/2023/11/irania… #cybersecurity #hacking

Cyber Outlook (@cyberoutlook) 's Twitter Profile Photo

The demand has only continued to rise, so this is a separate issue with the economy that many industries are facing, which has led to layoffs or hiring freezes. Cybersecurity still has a lot of opportunities compared to most industries.

The Hacker News (@thehackersnews) 's Twitter Profile Photo

Did you know, SOC teams spend 1/3 of their day on non-threatening events? Discover how automation covers 80% of threats, freeing up valuable time! 💼 Read more: thehackernews.com/2023/11/the-ne… #Cybersecurity

Dark Reading (@darkreading) 's Twitter Profile Photo

Move over MOVEit, there's a new zero-day being exploited to deploy Clop ransomware into enterprise networks. Becky Bracken reports: informatech.co/3QvjaNG #MOVEit

Health-ISAC (@healthisac) 's Twitter Profile Photo

We're proud to support #MoreThanAPasswordDay and the release of the Common Guidance on Passwords. Let's make the internet a safer place for all. Cyber Safety is Patient Safety! Nonprofit Cyber h-isac.org/nonprofit-cybe…

We're proud to support #MoreThanAPasswordDay and the release of the Common Guidance on Passwords. Let's make the internet a safer place for all. Cyber Safety is Patient Safety! <a href="/NonprofitCyber/">Nonprofit Cyber</a>
h-isac.org/nonprofit-cybe…