TheSecMaster(@TheSecMaster1) 's Twitter Profile Photo

Here are 50 domains of cybersecurity :

1. 🔒 Network Security
2. 📱 Application Security
3. ☁️ Cloud Security
4. 📱 Mobile Security
5. 🛡️ Cryptography
6. 💼 Data Loss Prevention (DLP)
7. 👤 Identity and Access Management (IAM)
8. 💻 Endpoint Security
9. 🚨 Incident Response
10.

account_circle
Astropin (Flip Gold Gang)(@Astropin) 's Twitter Profile Photo

's game theory endpoint: You either adopt Bitcoin or you lose. It doesn't matter if you're an individual, a corporation or a nation state. You adopt, or you lose.

account_circle
Kamran Bekirov(@kamranbekirovyz) 's Twitter Profile Photo

Using the logarte package, you can not only monitor sent network requests in your app but also copy the body, headers, endpoint URL individually or share all of them as a compact text with the device's share window.

logarte on pub: pub.dev/packages/logar…

account_circle
BLK MKT Productions(@BLKMKTProd) 's Twitter Profile Photo

We are beyond excited to announce this partnership! Catch us providing affordable & top-of-the-line options for broadcast and media solutions with the Loadout and Endpoint media people!🔥

account_circle
Quentin(@gfusee33) 's Twitter Profile Photo

LIVE 🚨

The first smart contract written in the Swift language has been successfully deployed on the devnet 🔥

This contract has one endpoint called 'echoHelloWorld' which always returns 'Hello World!'

The entire experiment was conducted during tonight's

LIVE 🚨

The first #MultiversX smart contract written in the Swift language has been successfully deployed on the devnet  🔥

This contract has one endpoint called 'echoHelloWorld' which always returns 'Hello World!'

The entire experiment was conducted during tonight's
account_circle
HotCakeX 🇮🇱(@CyberCakeX) 's Twitter Profile Photo

Just released new version of WDACConfig
✅MSFT Defender for Endpoint Advanced Hunting
✅High performance and Accurate logs processing
✅Scalable
✅GUI for cloud log selection and filtering
✅All logic built-in 💯

github.com/HotCakeX/Harde…

💙

account_circle
ChainGPT Pad(@ChainGPT_Pad) 's Twitter Profile Photo

📌 How to Use OMNIA Protocol - DeFi RPC:

1️⃣ Launch app.omniatech.io
2️⃣ Connect your wallet
3️⃣ Generate endpoint
4️⃣ Select a blockchain and customize the subscription
Choose 'help me' if unsure.
5️⃣ Enable Frontrunning & Honeypot protection
6️⃣ Sign the request in the MetaMask wallet

📌 How to Use @omnia_protocol:

1️⃣ Launch app.omniatech.io
2️⃣ Connect your wallet
3️⃣ Generate endpoint
4️⃣ Select a blockchain and customize the subscription
Choose 'help me' if unsure. 
5️⃣ Enable Frontrunning & Honeypot protection
6️⃣ Sign the request in the MetaMask wallet
account_circle
TheSecMaster(@TheSecMaster1) 's Twitter Profile Photo

Here are 50 domains of cybersecurity :

1. 🔒 Network Security
2. 📱 Application Security
3. ☁️ Cloud Security
4. 📱 Mobile Security
5. 🛡️ Cryptography
6. 💼 Data Loss Prevention (DLP)
7. 👤 Identity and Access Management (IAM)
8. 💻 Endpoint Security
9. 🚨 Incident Response
10.

account_circle
Dan Bartus(@DanBartus) 's Twitter Profile Photo

We surveyed over 50 CISOs, and the majority think AI will impact cybersecurity MORE than the Cloud did.

If true, there's major changes coming for security, given Cloud ushered in Zero Trust, shifted spending from Network to Identity & Endpoint, birthed decacorns like Wiz

account_circle
.NET(@dotnet) 's Twitter Profile Photo

We've made some updates to Core in .NET 9 Preview 3. Here's a summary of what's new, including:
➕ Endpoint metadata on the developer exception page
➕ Added InternalServerError to TypedResults
➕ Handle keyboard composition events in Blazor
📖 msft.it/6013c7d3L

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Thought your firewall was enough?

Guess again... AiTM phishing, OAuth exploits, SSO attacks...hackers are getting creative targeting cloud identities.

Understand the next wave of cyberattacks – read this article: thehackernews.com/2024/04/showca…

account_circle
Ryan Hughes(@hughrt7) 's Twitter Profile Photo

Dr. Nina Niu Sanford Appreciate your💡on this topic! PROs critical but undervalued, HRQOL endpoint design/reporting remains unregulated in many prospective studies. U.S. FDA and ISOQOL guidance published, we need more pt-centered trial design from the ground up

@NiuSanford Appreciate your💡on this topic! PROs critical but undervalued, HRQOL endpoint design/reporting remains unregulated in many prospective studies. @US_FDA and @ISOQOL guidance published, we need more #radonc #ONCSM pt-centered trial design from the ground up
account_circle
1rpc _(@1rpc_) 's Twitter Profile Photo

Connect to Horizen with 1RPC's privacy-protected endpoint.

Say goodbye to metadata exposure. 1RPC uses advanced technical methods to ensure users' information remains secure.

Learn more ↓
blog.ata.network/horizen-eon-is…

account_circle
Ashley Hamik(@HamikChem) 's Twitter Profile Photo

After going over how to pick indicators and why the endpoint color change is +/- 1 pH unit from pKa
'But, like, HOW do indicators work?'

-> Cut to 10 min later, this on the board & all I can think is, 'I really need to actually sit and make those magnets this summer.'

After going over how to pick indicators and why the endpoint color change is +/- 1 pH unit from pKa
'But, like, HOW do indicators work?'

-> Cut to 10 min later, this on the board & all I can think is, 'I really need to actually sit and make those magnets this summer.' #APchem
account_circle