Joel Conover (@joconove) 's Twitter Profile
Joel Conover

@joconove

Keysight Marketing Leader. Networking Nerd. Hardware and software hacker. Busy father. Waterskier, guitar player, amp builder. Views are my own.

ID: 19977317

calendar_today03-02-2009 15:29:10

400 Tweet

181 Followers

191 Following

Lori MacVittie | Revelation 2:20 (@lmacvittie) 's Twitter Profile Photo

1.Find vulnerable consumer-grade routers 2.Gain access, replace DNS entries to point to attacker-controlled servers 3.PROFIT #security #wearelosing zdnet.com/article/gigant…

Joel Conover (@joconove) 's Twitter Profile Photo

I'm recruiting a product marketing NPI lead. Please share if you know someone looking for an exciting role managing global product launches at an amazing high-tech company career4.successfactors.com/sfcareer/jobre…

Joel Conover (@joconove) 's Twitter Profile Photo

Help create the future by engaging students in #IoT. Share this opportunity with the next generation of inventors: youtu.be/7gskhSAD3R4

Joel Conover (@joconove) 's Twitter Profile Photo

Keysight is hiring a senior-level IT product marketer for our flagship Ixia network packet brokers, taps, bypass switches, and application performance tools. Austin or flexible for the right candidate jobsearch.keysight.com…/Austin-Technica…/544114700/

Joel Conover (@joconove) 's Twitter Profile Photo

From @HelpNetSecurity: 53% of enterprises have no idea if their security tools are working #SecOps bit.ly/2Kx910P #Ixiacom

Joel Conover (@joconove) 's Twitter Profile Photo

Someone will go home with $50k in cash and $50k in #keysight equipment at today’s #keysightiotchallenge. Catch the livestream at keysight.com 1pm EDT.

Someone will go home with $50k in cash and $50k in #keysight equipment at today’s #keysightiotchallenge. Catch the livestream at keysight.com 1pm EDT.
Joel Conover (@joconove) 's Twitter Profile Photo

Considering Threat Hunting? Passive security practices may not be good enough to secure your network. Keith Bromley discusses how to begin #threathunting in his blog, Threat Hunting – Where to Start bit.ly/2mKR2Mk #Ixiacom #SecOps #NetOps

Joel Conover (@joconove) 's Twitter Profile Photo

Are your security monitoring tools overwhelmed? Win a $50,000 network makeover to improve your security monitoring. Join Ixia for the #IxiaNetworkMakeover, a multi-day event w/ prizes, free gear, exclusive content, tips & tricks. #SecOps 🔥 🔥Enter: bit.ly/2qjbTbn 🔥

Joel Conover (@joconove) 's Twitter Profile Photo

$50K in tools to improve network security and visibility? Enter to win today: youtu.be/xQTiWnjoKpg #ixia #networkmakeover

KeysightNews (@keysightnews) 's Twitter Profile Photo

Medical electronic devices are facing a critical test. Ee Huei-Sin of Keysight explores technical issues affecting healthcare network infrastructure in Business Today magazine bit.ly/2OPad2j #HealthIT #Telehealth

Keysight Network Visibility Test & Security (@keysightnas) 's Twitter Profile Photo

.Keysight’s Vision X network packet broker with Mobile Stack capabilities now delivers 5G-scale quality of service monitoring to mobile network operators. It enables scalable, subscriber-aware visibility in #4G and #5G packet core bit.ly/3sZhjUB #NetworkVisibility