Thomas Marr (@cybertuff) 's Twitter Profile
Thomas Marr

@cybertuff

👨‍💻 Cybersecurity Engineer 🛡 Member CompTIA CAC 🕶 Former Military Intelligence 👔 LinkedIn linkedin.com/in/thomascmarr

ID: 1240990067931447299

calendar_today20-03-2020 13:14:39

3,3K Tweet

593 Followers

1,1K Following

Intel (@intel) 's Twitter Profile Photo

Cyber breaches can be reduced by cyber #security 🔒 @ChuckBrooks shares how a shift to remote and hybrid work has left companies vulnerable to hackers. #ZeroTrust security is using the #IntelvPro platform to help fight off unwanted threats.

Thomas Marr (@cybertuff) 's Twitter Profile Photo

So I just got laid off. Looking for security engineer, ISSE, and ISSO type roles in the DFW, TX area or remote. I have a compsci bachelors degree, 7 years XP, CISSP, and a TS/SCI. Open to on-site, hybrid, and remote roles.

Rob May #BeCyberSmart (@robmay70) 's Twitter Profile Photo

⭕️ The Singapore #AI Model Framework is a really useful resource, it translates ethical principles into practical recommendations that organisations could readily adopt to deploy Al responsibly. pdpc.gov.sg/-/media/files/…

⭕️ The Singapore #AI Model Framework is a really useful resource, it translates ethical principles into practical recommendations that organisations could readily adopt to deploy Al responsibly.

pdpc.gov.sg/-/media/files/…
Bob Carver ✭ (@cybersecboardrm) 's Twitter Profile Photo

Greenblatt also noted that 99.99% of the 18,000 accounts that staff cracked met the Department's password complexity requirements — including "Password-1234." businessinsider.com/us-department-… #CyberSecurity #DepartmentOfInterior #passwordsecurity

Bob Carver ✭ (@cybersecboardrm) 's Twitter Profile Photo

Cybercriminals are touting large language models that could help them with phishing or creating malware. But the AI chatbots could just be their own kind of scam. wired.com/story/chatgpt-… #CyberSecurity #LLM #ChatGPT #clones

Rob May #BeCyberSmart (@robmay70) 's Twitter Profile Photo

⭕️ Retraining staff to make use of AI tools is probably harder than implementing the actual technology. This is essential to realise the promised productivity gains. #AI #ChatGPT

⭕️ Retraining staff to make use of AI tools is probably harder than implementing the actual technology. This is essential to realise the promised productivity gains. #AI #ChatGPT
Bob Carver ✭ (@cybersecboardrm) 's Twitter Profile Photo

Chinese military hackers gained access to classified defense networks in Japan beginning in 2020, accessing information about the U.S. ally’s military capabilities and plans, according to a Washington Post report. forbes.com/sites/anafaguy… #Japan #DefenseNetworks #China

Chinese military hackers gained access to  classified defense networks in Japan beginning in 2020, accessing  information about the U.S. ally’s military capabilities and plans,  according to a Washington Post report.  forbes.com/sites/anafaguy… #Japan #DefenseNetworks #China
Bob Carver ✭ (@cybersecboardrm) 's Twitter Profile Photo

Microsoft has patched a total of 74 flaws in its software as part of the company's Patch Tuesday updates for August 2023, down from the voluminous 132 vulnerabilities the company fixed last month. thehackernews.com/2023/08/micros… #CyberSecurity #Microsoft #PatchNow

Helen Yu (@yuhelenyu) 's Twitter Profile Photo

🚀 Unlock the future of Innovation! Dive into our latest #CXOSpice featuring insights from David Takeuchi (DT), Partner at EY, as we explore the groundbreaking world of “vertical innovation” and how @EY-Nottingham Spirk Innovation Hub turns concepts into tangible business

🚀 Unlock the future of Innovation! Dive into our latest #CXOSpice featuring insights from David Takeuchi (DT), Partner at <a href="/EYnews/">EY</a>, as we explore the groundbreaking world of “vertical innovation” and how @EY-<a href="/NottinghamSpirk/">Nottingham Spirk</a> Innovation Hub turns concepts into tangible business
Rob May #BeCyberSmart (@robmay70) 's Twitter Profile Photo

⭕️ Infostealer malware has risen to prominence as one of the most significant vectors of cybercrime over the past three years. #cybersecurity #infosec bleepingcomputer.com/news/security/…

Bob Carver ✭ (@cybersecboardrm) 's Twitter Profile Photo

Panasonic Warns That Internet of Things Malware Attack Cycles Are Accelerating wired.com/story/panasoni… #CyberSecurity #IoT #Panasonic #blackhatusa2023

Panasonic Warns That Internet of Things Malware Attack Cycles Are Accelerating wired.com/story/panasoni… #CyberSecurity #IoT #Panasonic #blackhatusa2023
Bob Carver ✭ (@cybersecboardrm) 's Twitter Profile Photo

Hackers to compete for nearly $20 million in prizes by using A.I. for cybersecurity, Biden administration announces cnbc.com/2023/08/09/bid… #CyberSecurity #AI #20millionDollars

Hackers to compete for nearly $20 million in prizes by using A.I. for cybersecurity, Biden administration announces cnbc.com/2023/08/09/bid… #CyberSecurity #AI #20millionDollars
Bob Carver ✭ (@cybersecboardrm) 's Twitter Profile Photo

🚨 Quintuple Ransom Alert: A New Wave of Sophistication in Ransomware Attacks 🚨 In the ever-evolving landscape of cyber threats, a new term has emerged: "Quintuple Ransom." linkedin.com/posts/bobcarve… #cybersecurity #cyberawareness #cyberattacks #ransomware

🚨 Quintuple Ransom Alert: A New Wave of Sophistication in Ransomware Attacks 🚨
In the ever-evolving landscape of cyber threats, a new term has emerged: "Quintuple Ransom."
linkedin.com/posts/bobcarve… #cybersecurity #cyberawareness #cyberattacks #ransomware
Bob Carver ✭ (@cybersecboardrm) 's Twitter Profile Photo

China’s hackers have been positioning themselves to conduct destructive cyberattacks on U.S. critical infrastructure, a top U.S. cyber official warned Saturday. www-nbcnews-com.cdn.ampproject.org/c/s/www.nbcnew… #CyberSecurity #US #infrastructure #China #DefCon

Bob Carver ✭ (@cybersecboardrm) 's Twitter Profile Photo

This is how college professors know you're cheating with AI | CNN Business cnn.com/videos/busines… #AI #generativeAI #cheating #college #CyberSecurity

This is how college professors know you're cheating with AI | CNN Business cnn.com/videos/busines… #AI #generativeAI #cheating #college #CyberSecurity
Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

📌 Q: What is a WAF or web access firewall? A: A WAF or web application firewall helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. v/ Cloudflare Cc: @fogle_shane #cloud #cloudsecurity #aisecurity

Jo Peterson (@cleartechtoday) 's Twitter Profile Photo

⭐ ⭐ ⭐ Day 12--Securing #AgenticAI Learning Alert ⭐ ⭐ ⭐ Working with my colleague David Linthicum, we’re going to review the OWASP Top 10 critical vulnerabilities for LLMs and provide practical suggestions for mitigation of these vulnerabilities Today's Topic: Model Theft

Thomas Marr (@cybertuff) 's Twitter Profile Photo

#ad Until March 3rd, a new Tesla Model 3 is a very good, potentially once in a lifetime, deal. A new base Tesla Model 3 costs roughly $42.5k, but can cost as low as $31.5k (or lease as low as $236/mo). -$7.5k Federal Tax credit, which could go away very soon. -$1k if eligible

#ad Until March 3rd, a new <a href="/Tesla/">Tesla</a> Model 3 is a very good, potentially once in a lifetime, deal.

A new base <a href="/Tesla/">Tesla</a> Model 3 costs roughly $42.5k, but can cost as low as $31.5k (or lease as low as $236/mo).

-$7.5k Federal Tax credit, which could go away very soon.
-$1k if eligible