Mike Privette (@mikepsecuritee) 's Twitter Profile
Mike Privette

@mikepsecuritee

CISO and cybersecurity economist @ReturnOnSec | Talk about cybersecurity, career advancement, newsletters, and memes

ID: 2253589255

linkhttps://www.returnonsecurity.com/subscribe calendar_today19-12-2013 14:11:23

2,2K Tweet

2,2K Takipçi

526 Takip Edilen

ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ ⚙️ (@danielmiessler) 's Twitter Profile Photo

If you know AI-skeptics—or you are one—this is my absolute best argument for how and why AI will disrupt business and society. ➡️ "AI" is a confusing word ➡️ Don't think "AI"—think Intelligence Tasks ➡️ Multiple, real-world examples… danielmiessler.com/p/weve-been-th…

Mike Privette (@mikepsecuritee) 's Twitter Profile Photo

With great [AI] power comes great responsibility. I'm thrilled to introduce the Shared Responsibility Model for AI Security—a framework designed to divide security responsibilities between AI service providers and businesses based on common deployment models. This post covers:

With great [AI] power comes great responsibility.

I'm thrilled to introduce the Shared Responsibility Model for AI Security—a framework designed to divide security responsibilities between AI service providers and businesses based on common deployment models.

This post covers:
Jon Sakoda (@jonsakoda) 's Twitter Profile Photo

I am looking forward to kicking off Black Hat tomorrow with Mike Privette (Return on Security), Ross Haleliuk (Venture in Security), and Kaiti Delaney (1011 Ventures) at the Innovators and Investors Summit * Is the AI hype real? * Is the cyber market overfunded or

I am looking forward to kicking off Black Hat tomorrow with <a href="/mikepsecuritee/">Mike Privette</a> (Return on Security), <a href="/rosshaleliuk/">Ross Haleliuk</a> (Venture in Security), and <a href="/KaitiDelaney/">Kaiti Delaney</a> (1011 Ventures) at the Innovators and Investors Summit

* Is the AI hype real? 
* Is the cyber market overfunded or
Mike Privette (@mikepsecuritee) 's Twitter Profile Photo

💰 Security, Funded issue #155 from Return on Security is out, together with ThreatLocker This week's data highlights include: - 10 companies raised $166.1M across 8 unique product categories - 4 companies were acquired or had a merger event - 90% of funding went to product-based

Mike Privette (@mikepsecuritee) 's Twitter Profile Photo

Very cool and thoughtful package from beehiiv 🐝 and handwritten note from Tyler Denk 🐝 after hitting 10K subscribers for Return on Security! The card even has a QR code on the back that links to my the sign up page!

Very cool and thoughtful package from <a href="/beehiiv/">beehiiv 🐝</a> and handwritten note from <a href="/denk_tweets/">Tyler Denk 🐝</a> after hitting 10K subscribers for <a href="/ReturnOnSec/">Return on Security</a>!

The card even has a QR code on the back that links to my the sign up page!
Mike Privette (@mikepsecuritee) 's Twitter Profile Photo

no one will remember: - how busy you were - how big your salary was - how many hours you worked they will remember: - how many security questionnaires you sent - how many SOC 2 reports you looked at - how many pen tests you skimmed

Clint Gibler (@clintgibler) 's Twitter Profile Photo

🤖 TL;DR: Every AI Talk from Hacker Summer Camp 2024 There were >60 AI-related talks at BSides Las Vegas, Black Hat, and DEF CON this year I wanted to know what everyone was working on, so I gathered all of the talks in one place And then summarized their abstracts in 1 (and

🤖 TL;DR: Every AI Talk from Hacker Summer Camp 2024

There were &gt;60 AI-related talks at <a href="/BSidesLV/">BSides Las Vegas</a>, <a href="/BlackHatEvents/">Black Hat</a>, and <a href="/defcon/">DEF CON</a> this year

I wanted to know what everyone was working on, so I gathered all of the talks in one place

And then summarized their abstracts in 1 (and
Matt Johansen (@mattjay) 's Twitter Profile Photo

Google uncovered evidence that Russian government hackers (APT29) are using exploits "identical or strikingly similar" to those developed by spyware companies Intellexa and NSO Group. And we don't know how they got their hands on it... Here's what we know: 🧵

Matt Johansen (@mattjay) 's Twitter Profile Photo

⚠️ Breaking: North Korea just burned an 0-Day in Chromium. They used it to install a Windows rootkit and the campaign targeted cryptocurrency platforms and users. Here's what we know:

Matt Johansen (@mattjay) 's Twitter Profile Photo

This is an absolutely wild one by Ian Carroll and Sam Curry The most basic SQL injection ever in the Known Crewmember (KCM) and Cockpit Access Security System (CASS) used by airlines and TSA. Literally ' OR 1=1 got them admin access. Here's what we know: