Gianluca Brindisi (@gbrindisi) 's Twitter Profile
Gianluca Brindisi

@gbrindisi

If all you have is a battle-axe, everything looks like hours of fun | Security Engineer @Spotify

ID: 121472518

linkhttps://cloudberry.engineering calendar_today09-03-2010 16:13:32

989 Tweet

503 Followers

80 Following

Gianluca Brindisi (@gbrindisi) 's Twitter Profile Photo

Thanks TROOPERS Conference for hosting us and thanks to everyone attending our Distributed Cloud Security Alerting talk! We had a blast! Slides will come soon cc: carly

Lorenzo Franceschi-Bicchierai (@lorenzofb) 's Twitter Profile Photo

OK, I can't take this anymore. I have to rant. I grew up as an Italian, eating pasta almost every day. I cook pasta often, and believe it should be a staple in anybody's diet. But I cannot justify restaurants that charge you $18 or $20 (or more!) for a serving of pasta.

Sundar Pichai (@sundarpichai) 's Twitter Profile Photo

Your Android phone can now be your security key for 2-step verification - it’s built into devices running Android 7.0+, making it easier to log into your Google Account securely

Kyle Tobener (@kylekyle) 's Twitter Profile Photo

~9 months ago we learned about Spotify's Comet project (clustered security alerting) from carly & Gianluca Brindisi at TROOPERS Conference. Yesterday we rolled out our pilot of Comet and delivered >1500 security alerts. I love learning about things at conferences then DEPLOYING THEM.

Grambulf (@grambulf) 's Twitter Profile Photo

Kyle Tobener carly Gianluca Brindisi TROOPERS Conference Awesome to hear that. I missed @[email protected] talk because I wanted to listen to Carly and Gianluca. The concept of comet is interesting for us. We did not start implementing it, but I still have it on my list. I would love to hear which problems you faced and how you solved it.

Corey Quinn (@quinnypig) 's Twitter Profile Photo

Security myth: rotate your Amazon Web Services IAM credentials frequently so your console doesn't yell at you. In practice, compromised keys are exploited in less time than it takes to microwave a burrito. Use role assumption if you can, but rotating keys is busywork.

Security myth: rotate your <a href="/awscloud/">Amazon Web Services</a> IAM credentials frequently so your console doesn't yell at you.

In practice, compromised keys are exploited in less time than it takes to microwave a burrito. Use role assumption if you can, but rotating keys is busywork.
Turing Pi (@turingpi) 's Twitter Profile Photo

Dear community, we know that you are eagerly waiting for the release of the Turing Pi 2. But, our hands are tight by PayPal. For almost a year they keep frozen our funds necessary to continue operations and launch TPI2. Please share this thread to raise awareness...

Dear community, we know that you are eagerly waiting for the release of the Turing Pi 2. But, our hands are tight by <a href="/PayPal/">PayPal</a>. For almost a year they keep frozen our funds necessary to continue operations and launch TPI2. Please share this thread to raise awareness...