Sahir Hidayatullah (@sahirh) 's Twitter Profile
Sahir Hidayatullah

@sahirh

Founder / CEO of Smokescreen Technologies (acq. by Zscaler Inc, 2021)

ID: 15393961

linkhttp://www.smokescreen.io calendar_today11-07-2008 17:13:44

827 Tweet

581 Takipçi

322 Takip Edilen

Dark Reading (@darkreading) 's Twitter Profile Photo

SOC analysts shoulder the largest cybersecurity burden, working around the clock to prevent, detect, assess, and respond to threats & incidents. The avg SOC sees 10k alerts/day. They may miss one- after all, they're only human, say Roselle Safran Utpal U.J. Desai ubm.io/2Tl1hFB

Augusto Barros (@apbarros) 's Twitter Profile Photo

My colleague Gorka Sadowski just provided a cool case of integrating SIEM and Deception technologies with automation at #GartnerSEC opening keynote

Nikhil Mittal (@nikhil_mitt) 's Twitter Profile Photo

DEF CON Slides for my talk 'RACE - Minimal Rights and ACE for Active Directory Dominance' at #DEFCON27 are up : media.defcon.org/DEF%20CON%2027…

Sahir Hidayatullah (@sahirh) 's Twitter Profile Photo

“We interdict the adversary’s ability to navigate the kill-chain by hunting across the battlespace for points of egress and exfiltration. We deploy precision cyber-munition countermeasures to neutralise deep-cover threats.” <— real or fake?

Stephen "Now on Bluesky" Cobb (@zcobb) 's Twitter Profile Photo

For me, one of the most useful macro-level talks on #cybersecurity in recent years was this by Gadi Evron. A lot of us in #infosec have felt the Cassandra effect and spent time clearing up messes created by the long tail of flawed tech decisions. youtu.be/ie54gnjUtGA

SmokescreenTech (@smokescreentech) 's Twitter Profile Photo

#throwbackthursday An oldie but a goodie. Sahir Hidayatullah and Varun Haran from ISMG Network News talk about why defenders need to think like the attacker and how deception technology helps security teams play offense. hubs.ly/H0tmws40

#throwbackthursday An oldie but a goodie. <a href="/sahirh/">Sahir Hidayatullah</a> and <a href="/APACinfosec/">Varun Haran</a> from <a href="/ISMG_News/">ISMG Network News</a> talk about why defenders need to think like the attacker and how deception technology helps security teams play offense.
hubs.ly/H0tmws40
Augusto Barros (@apbarros) 's Twitter Profile Photo

One thing we MUST change as an industry: Please stop focusing on the initial access point when breaches happen. There will always be a way in. I want to see people talking about why it wasn't detected sooner and where response failed.

Axonius (@axoniusinc) 's Twitter Profile Photo

In the last episode of The Great Debate webinar, Danny Jenkins & Sameh Sabry debated whether or not #ThreatHunting should be the top #cybersecurity priority right now. Read the recap: axoni.us/30payyX

Sudarshan (@sudartion) 's Twitter Profile Photo

1/2 - Possible #activedefense measures against golang based XMRig. 1. Decoy public jenkins and tomcat pages to trap password guessing. 2. Open port 52013 on DMZ machines locally to prevent execution #infosec #DFIR Credits:intezer.com/blog/research/…

CrowdStrike (@crowdstrike) 's Twitter Profile Photo

We’re sponsoring #ZenithLive 2021, an event designed to help you navigate the digital future at cloud speed. Join @amol_s_kulkarni during tomorrow morning’s keynote to hear how CrowdStrike and Zscaler work together to deliver end-to-end protection. bit.ly/3xc7kN2

We’re sponsoring #ZenithLive 2021, an event designed to help you navigate the digital future at cloud speed. Join @amol_s_kulkarni during tomorrow morning’s keynote to hear how <a href="/CrowdStrike/">CrowdStrike</a> and <a href="/zscaler/">Zscaler</a> work together to deliver end-to-end protection. bit.ly/3xc7kN2
Sahir Hidayatullah (@sahirh) 's Twitter Profile Photo

Had a fun chat with the inimitable haroon meer. In conversation, “they say never meet your heroes” — well, he’s one of mine, and I’m glad I met him. Much ❤️ to the Thinkst Canary team from all of us at Smokescreen, now Zscaler. Fight the good fight. Respect > competition.