Thomas Billaut (@tbillaut) 's Twitter Profile
Thomas Billaut

@tbillaut

Sharing knowledge and prospective on cybersecurity. Infosec professional. Working for a better World.
'The more you know, the more you know you don't know.'

ID: 242893314

linkhttp://fr.linkedin.com/in/thomasbillaut calendar_today25-01-2011 20:59:08

977 Tweet

373 Takipçi

1,1K Takip Edilen

Thomas Billaut (@tbillaut) 's Twitter Profile Photo

A low radar attack by Midnight Blizzard: Guidance for responders on nation-state attack by Microsoft Threat Intelligence #infosec #apt #Espionage microsoft.com/en-us/security…

Thomas Billaut (@tbillaut) 's Twitter Profile Photo

FBI and CISA publish guide to Living off the Land techniques #infosec #livingOffTheLand malwarebytes.com/blog/news/2024…

Thomas Billaut (@tbillaut) 's Twitter Profile Photo

Excellent ! Data structuring, visualisation and communication. Mastering Cyber Threat Intelligence with Obsidian. Utilize Obsidian to transform your CTI dataset and uncover unprecedented connections #infosec #cti #obsidian bank-security.medium.com/mastering-cybe…

Thomas Billaut (@tbillaut) 's Twitter Profile Photo

Responding to a cyber incident – a guide for CEOs. Guidance to help CEOs in public and private sector organisations manage a cyber incident by NCSC #infosec #cyber #incident #response ncsc.gov.uk/guidance/ceos-…

Thomas Billaut (@tbillaut) 's Twitter Profile Photo

How to cope with frustration in infosec ? A way of explaining why security's baseline is so low in places, and why it's so hard to raise. Here are the Efficient Security Principles via ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ 🛡️ #infosec #principles #baseline danielmiessler.com/p/efficient-se…

Thomas Billaut (@tbillaut) 's Twitter Profile Photo

5 Steps for Creating an AppSec Program : Threat Model -> Design -> Scan -> Scale -> Run the program #infosec #cybersecurity pulse.latio.tech/p/latio-pulse-…

Thomas Billaut (@tbillaut) 's Twitter Profile Photo

AWS’s head of security shares 7 reasons why security will always be Amazon’s top priority #infosec #cybersecurity #ciso #vision aboutamazon.com/news/aws/aws-s…

Harvard Business Review (@harvardbiz) 's Twitter Profile Photo

At many companies, people spend around 80% of their time in meetings or answering colleagues’ requests, leaving little time for all the critical work they must complete on their own. s.hbr.org/3j4ZTS1

Thomas Billaut (@tbillaut) 's Twitter Profile Photo

Excellent : Evil MSI. A story about vulnerabilities in MSI Files. Many thanks CICADA8Research #infosec #windows #msi cicada-8.medium.com/evil-msi-a-lon…

Thomas Billaut (@tbillaut) 's Twitter Profile Photo

Over 90 million French records exposed: mysterious data hoarder leaves instances open #infosec cybernews.com/security/frenc…

Thomas Billaut (@tbillaut) 's Twitter Profile Photo

The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access. #infosec #APT #TTP volexity.com/blog/2024/11/2…

Thomas Billaut (@tbillaut) 's Twitter Profile Photo

Foundations for modern defensible architecture #infosec #cyber #defensible #zta #architecture cyber.gov.au/resources-busi…

Thomas Billaut (@tbillaut) 's Twitter Profile Photo

CERT-FR said that Apple notified users of a new spyware campaign a week earlier and urged all individuals in France who received this notification to contact them immediately. #infosec #vulnerabilty infosecurity-magazine.com/news/france-ap…

Thomas Billaut (@tbillaut) 's Twitter Profile Photo

How Google Does It: Building AI agents for cybersecurity and defense #infosec #agentic #cyber cloud.google.com/transform/how-…