Alex Bassagiannis (@alexfotiosb) 's Twitter Profile
Alex Bassagiannis

@alexfotiosb

Technology Cybersecurity Entrepreneur 🔸 Providing data-driven cybersecurity insights & market data 🔸 Available for pitches/interviews via DM.

ID: 1476169751017701376

linkhttps://www.linkedin.com/in/fotios calendar_today29-12-2021 12:35:42

1,1K Tweet

223 Takipçi

1,1K Takip Edilen

Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

Myth: Open Source is more secure than proprietary as it gets reviewed & scrutinized by a community of experts Truth: It's only for a minority of very popular OS projects. The majority of it is developed & reviewed, often by a few anon people & it's of dubious quality & intent

Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

Ransomware's success largely depends on: - "Locked" info either not being backed up regularly or - The backup itself being accessible by the same rogue app If backup was done by a remote server logging in and fetching it, instead of vice versa, success rates would be lower

Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

An APT is an attack in which an intruder establishes a long-term presence on a network to access data. Some implications: 1) At least one such intruder among the employees of any large company 2) Getting hired by a target is a form of social engineering that becomes APT

An APT is an attack in which an intruder establishes a long-term presence on a network to access data. Some implications:

1) At least one such intruder among the employees of any large company
2) Getting hired by a target is a form of social engineering that becomes APT
Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

We've seen data-wiping malware and DDoS attacks stem from the Ukraine-Russia conflict, causing major disruption of key services. By staying updated on new cyberattacks and vulnerabilities, organizations can be prepared to defend against such politically motivated attacks.

Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

A growing trend in cybersecurity is the incorporation of artificial intelligence and machine learning into products that detect and respond to threats. vpnbrains.com/blog/uses-and-…

Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

Many organizations are still using outdated software with major vulnerabilities because installing software updates is easier said than done. Software updates may result in system downtime, productivity losses, and complications such as an inability to access old files.

Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

An APT is an attack in which an intruder establishes a long-term presence on a network to access data. It takes just one such intruder among the employees of any large company to carry out an insider APT attack.

Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

AI threat detection has a high false positive rate, which has the downsides of: 1) Giving cybersecurity professionals less time to investigate true threats, and 2) Sometimes leading them to misclassify true threats as false positives due to taking these alerts less seriously.

Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

AI has promising capabilities, but also drawbacks such as bias and a limited creative "thinking" capability. We should be cautious of surrealist optimism, which can be a major IT Security vulnerability per se. #AI #security #ArtificialIntelligence

Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

Although Linux is often referred to as one of the most secure operating systems, Linux systems are still at risk due to reasons such as Linux malware and misconfigurations.

Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

Thank you @g2toyou for quoting me in your ConsumerAffairs article on the issue of potential cyberattacks stemming from the Russia-Ukraine conflict and how consumers can protect themselves! consumeraffairs.com/news/consumers…

Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

Human error is the cause of 95% of cybersecurity breaches according to IBM, which is one of the major reasons why employee education about cybersecurity best practices is so important. (Image via SSDTech) ssdtechie.com/2020/07/06/the… #cybersecurity #breaches

Human error is the cause of 95% of cybersecurity breaches according to IBM, which is one of the major reasons why employee education about cybersecurity best practices is so important. (Image via SSDTech)

ssdtechie.com/2020/07/06/the…

#cybersecurity #breaches
Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

Here are some great movies and shows to watch if you need a bit of a break from cybersecurity twitter (but not from cybersecurity itself): analyticsinsight.net/10-must-watch-… #cybersecurity #movies #cybersecuritymovies

Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

Bug bounty programs can be a huge help for finding security vulnerabilities. Ethical hackers help fill in the gaps for cybersecurity teams who are often understaffed and have limited bandwidth.

Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

Many organizations shy away from bug bounty programs, hoping to avoid bad PR if vulnerabilities are found. Survey findings indicate that 65% of organizations "want to be seen as infallible" threatpost.com/orgs-security-…

Alex Bassagiannis (@alexfotiosb) 's Twitter Profile Photo

Interesting article on the intersection between security and UI/UX design by @samthewriter. Thanks for the quote! darkreading.com/edge-articles/…