Werner Lindemann (@gbtinman) 's Twitter Profile
Werner Lindemann

@gbtinman

Sports Fanatic & Social Evangelist. Tweets reflect my own views. The most courageous act is still to think, for yourself. Aloud.

ID: 426448637

calendar_today02-12-2011 07:41:52

9,9K Tweet

1,1K Takipçi

1,1K Takip Edilen

Werner Lindemann (@gbtinman) 's Twitter Profile Photo

93% of organizations experienced at least one identity-related breach. Identity isn’t just a risk domain. It’s the dominant attack surface. Takeaway: Boards should ask: “Who can access what — and why?” buff.ly/b0RAfwb

93% of organizations experienced at least one identity-related breach.
Identity isn’t just a risk domain.
It’s the dominant attack surface.
Takeaway:
Boards should ask: “Who can access what — and why?”

buff.ly/b0RAfwb
Werner Lindemann (@gbtinman) 's Twitter Profile Photo

Sony exited the TV business to China’s TCL. I was born in the 1970s, and there’s a fascinating case study in how Japanese tech companies failed to make the transition to software. buff.ly/AGeuxqG

Werner Lindemann (@gbtinman) 's Twitter Profile Photo

API attacks increased by more than 30% year-on-year. APIs expose business logic, not just data. They’re harder to monitor and easier to abuse. Takeaway: API security belongs in enterprise risk discussions — not dev-only meetings. buff.ly/p88VOYE

API attacks increased by more than 30% year-on-year.
APIs expose business logic, not just data.
They’re harder to monitor and easier to abuse.
Takeaway:
API security belongs in enterprise risk discussions — not dev-only meetings.

buff.ly/p88VOYE
Werner Lindemann (@gbtinman) 's Twitter Profile Photo

Supply chain attacks remain a top-tier strategic threat. One vendor compromise can cascade across thousands of organizations. Takeaway: Third-party risk must be treated as first-party risk. Source: World Economic Forum – Global Cybersecurity Outlook 2024 buff.ly/OfjT8GX

Supply chain attacks remain a top-tier strategic threat.
One vendor compromise can cascade across thousands of organizations.
Takeaway:
Third-party risk must be treated as first-party risk.
Source: World Economic Forum – Global Cybersecurity Outlook 2024
buff.ly/OfjT8GX
Werner Lindemann (@gbtinman) 's Twitter Profile Photo

Only 16% of organizations say they are well prepared for major cyber incidents. Confidence gaps at leadership level remain dangerously wide. Takeaway: Preparedness is a governance metric — not a technical one. buff.ly/OfjT8GX

Only 16% of organizations say they are well prepared for major cyber incidents.
Confidence gaps at leadership level remain dangerously wide.
Takeaway:
Preparedness is a governance metric — not a technical one.

buff.ly/OfjT8GX
Werner Lindemann (@gbtinman) 's Twitter Profile Photo

The average organisation sees 223 genAI data policy violations per month — and 47% of genAI users use personal AI apps. Takeaway: Control data flow to genAI with DLP, sanctioned tools. buff.ly/5pZTsVD #ShadowAI #DLP #InsiderRisk #DataGovernance

The average organisation sees 223 genAI data policy violations per month — and 47% of genAI users use personal AI apps.
Takeaway:
Control data flow to genAI with DLP, sanctioned tools.
buff.ly/5pZTsVD
#ShadowAI #DLP #InsiderRisk #DataGovernance
Werner Lindemann (@gbtinman) 's Twitter Profile Photo

As the U.S. dollar weakened in 2025, we show the appreciation of several currencies against the U.S. dollar in a highly unpredictable year. buff.ly/fKpU6UG via @visualcap

As the U.S. dollar weakened in 2025, we show the appreciation of several currencies against the U.S. dollar in a highly unpredictable year. buff.ly/fKpU6UG via @visualcap
Werner Lindemann (@gbtinman) 's Twitter Profile Photo

#GenAI usage tripled — and prompts increased sixfold in the last year. Adoption is explosive. #Governance is not. #Data Security teams are now defending a moving target. buff.ly/5pZTsVD #Governance #CyberRisk

#GenAI usage tripled — and prompts increased sixfold in the last year.
Adoption is explosive.
#Governance is not.
#Data Security teams are now defending a moving target.

buff.ly/5pZTsVD
 #Governance #CyberRisk