Top Documents for @nicky_whiting

How BlackBerry Has Become a Cyber-Security Player
Published by: eweek.com | Found: 6 days ago
Tags: BlackBerry, Security, Player, Computer security, Anomaly detection and 159 more
Tweeted By: @padididit (tweet), @colorstreamedia (tweet), @richsimmondsza (tweet), @thehipposhoe (tweet), @infosechotspot (tweet) and 8 more
Tweeted For: @@sandraorion, @@cuelogic, @@mikestaub, @@prathamesh_real, @@ray_parker01 and 85 more
Twitter Lists: @chicagodesign-active-vcs-angels (link), @lean3jvv-proudly-south-african (link), @acmeducation-computingprofessionals (link), @azeem-interestingpeople (link), @grantmurray-cfo-list (link) and 12 more
More Info | Explore related documents
How do I stop old USB drives from infecting my new Windows PC?
Published by: theguardian.com | Found: 5 days ago
Tags: Windows, Drives, How Do, Drive, USB and 408 more
Tweeted By: @sectest9 (tweet), @gamergeeknews (tweet), @dougiebowser (tweet), @davidwhinray (tweet), @airshipholdings (tweet) and 17 more
Tweeted For: @@gauravks1, @@crweworld, @@julestimchenko, @@go2webmarketing, @@asiavirtual and 42 more
Twitter Lists: @britneyrecht-psychology (link), @rekha6-mediatechdesign (link), @matthieulefe-analytics-cool-people-2 (link), @carfor11-science (link), @ashleypqpqp-women-in-tech (link) and 21 more
More Info | Explore related documents
Chrome flaw on iOS leads to 500 million unwanted pop-up ads
Published by: nakedsecurity.sophos.com | Found: 5 days ago
Tags: Pop-up ad, Million, Chrome, Flaw, Ads and 151 more
Tweeted By: @infosechotspot (tweet), @nuharbor (tweet), @drjdrooghaag (tweet), @gvalan (tweet), @techl0g (tweet) and 9 more
Tweeted For: @@supertanyi, @@go2webmarketing, @@wpgaurav, @@robortbradley, @@pankaj2006 and 35 more
Twitter Lists: @chekhovsgoat-infosec (link), @cti_analyst-cybersecurity-all (link), @edgar_villegas-information-security (link), @rt_newsdesk-technology (link), @lincolncannon-decentralized-identity (link) and 5 more
More Info | Explore related documents
What is a side channel attack? How these end-runs around encryption put everyone at risk
Published by: csoonline.com | Found: 6 days ago
Tags: Encryption, At Risk, Channel, Attack, Risk and 86 more
Tweeted By: @arkangelscrap (tweet), @cybersecboardrm (tweet), @patrickcmiller (tweet), @securitynewsbot (tweet), @malwarepatrol (tweet) and 5 more
Tweeted For: @@diosdeveloper, @@cuelogic, @@ebiztrait, @@go2webmarketing, @@wpthemes2 and 24 more
Twitter Lists: @cti_analyst-cybersecurity-all (link), @edgar_villegas-information-security (link), @olisteadman-awesome-tech-women (link), @spuyet-erlang-lovers (link), @acmeducation-computingprofessionals (link) and 13 more
Linked By: cioindex.com (link)
More Info | Explore related documents
Cyberattacks are putting lives at risk
Published by: openaccessgovernment.org | Found: 9 days ago
Tags: Lives at Risk, At Risk, Attack, Cyber, Lives and 278 more
Tweeted By: @nicky_whiting (tweet), @utimaco (tweet)
Tweeted For: @@barbyingle, @@johnlaprise, @@analucianovak, @@cagrisahin20, @@fmfrancoise and 1 more
Twitter Lists: @ashleypqpqp-women-in-tech (link)
More Info | Explore related documents
Smart building complexity is creating dangerous new hacking opportunities
Published by: techradar.com | Found: 11 days ago
Tags: Opportunities, Complexity, Dangerous, Building, Hacking and 331 more
Tweeted By: @nicky_whiting (tweet), @synergogroup (tweet), @slolyserves (tweet), @milicadjekic9 (tweet)
Tweeted For: @@hannahgerstaec3, @@raultiru, @@thechirpnetwork, @@c_randieri, @@ubitiq
Twitter Lists: @ashleypqpqp-women-in-tech (link)
More Info | Explore related documents
Cyber security cluster established to protect Norfolk from hackers
Published by: edp24.co.uk | Found: 6 days ago
Tags: Security, Hackers, Norfolk, Cluster, Protect and 129 more
Tweeted By: @nicky_whiting (tweet), @michaeldacosta (tweet), @intelligenthq (tweet), @countup (tweet), @nicole_engage (tweet) and 1 more
Tweeted For: @@rosemaryosha, @@bernabephoto, @@i4interactive, @@loup_dargent, @@kshahwork and 5 more
Twitter Lists: @ashleypqpqp-women-in-tech (link), @grantmurray-cfo-list (link), @sapiencedesign-socent (link), @chrismakara-engagers (link), @lincolncannon-decentralized-identity (link) and 3 more
More Info | Explore related documents
Indian Student Destroys 59 University Computers With a 'Killer USB Drive’
Published by: gadgets.ndtv.com | Found: 4 days ago
Tags: University, USB drive, Computer, Student, Killer and 97 more
Tweeted By: @xhertx (tweet), @gadgets360 (tweet), @ndtv (tweet), @deviah (tweet), @nicky_whiting (tweet) and 3 more
Tweeted For: @@arthurbrandwood, @@kshahwork, @@analucianovak, @@jeff_tumbarello, @@amabaie and 15 more
Twitter Lists: @upthedownstair-india-news (link), @beabovethefray-tedx (link), @inventiveafrica-innovation-in-africa (link), @rajneeshgarg-india (link), @vvisheshanand-india-news (link) and 13 more
More Info | Explore related documents
Why Encryption Is the Cornerstone of Your Cloud Security
Published by: securityintelligence.com | Found: 4 days ago
Tags: Cornerstone, Encryption, Security, Encrypt, Cloud and 383 more
Tweeted By: @nicky_whiting (tweet)
Tweeted For: @@raultiru
Twitter Lists: @ashleypqpqp-women-in-tech (link)
More Info | Explore related documents
ThreatList: 3 Out of 4 Employees Pose a Security Risk to Businesses
Published by: threatpost.com | Found: 3 days ago
Tags: Security, Business, Pose, Risk, Employment
Tweeted By: @cybersecboardrm (tweet), @nicky_whiting (tweet)
Tweeted For: @@aging_freedom, @@hlagroproducts, @@jmrconnect_pr, @@smithsk, @@fmfrancoise and 5 more
Twitter Lists: @ashleypqpqp-women-in-tech (link), @edgar_villegas-information-security (link), @matthieulefe-analytics-cool-people-2 (link), @patosins-innovation (link), @taykuy-energy-and-environment (link)
More Info | Explore related documents
Study Notes and Theory - A CISSP Study Guide
Published by: studynotesandtheory.com | Found: 10 days ago
Tags: Study guide, Study Notes, Theory, Guide, Notes and 3 more
Tweeted By: @nicky_whiting (tweet), @sectest9 (tweet)
Tweeted For: @@asiavirtual, @@jmrconnect_pr, @@go2webmarketing, @@wpthemes2, @@barbyingle and 2 more
Twitter Lists: @carfor11-science (link), @ashleypqpqp-women-in-tech (link), @britneyrecht-psychology (link), @touchme4youle-news (link)
More Info | Explore related documents
Infographic: A Look at Hacking Trends
Published by: paymentsjournal.com | Found: 11 days ago
Tags: Infographic, Hacking, Trends
Tweeted By: @stanleyepstein (tweet), @caffsec (tweet), @nicky_whiting (tweet), @paymentworx (tweet)
Tweeted For: @@raultiru
Twitter Lists: @ashleypqpqp-women-in-tech (link), @lincolncannon-decentralized-identity (link)
More Info | Explore related documents
izea.it/cKdpQFF
Published by: izea.it | Found: 9 days ago
Tweeted By: @ottlegalrebels (tweet), @nicky_whiting (tweet), @sectest9 (tweet), @valerie2350 (tweet)
Tweeted For: @@ray_parker01, @@jmrconnect_pr, @@globalowlsshare, @@fmfrancoise, @@amabaie and 22 more
Twitter Lists: @touchme4youle-news (link), @ashleypqpqp-women-in-tech (link), @britneyrecht-psychology (link), @carfor11-science (link), @enrique_ball-philanthropy-thinkers (link) and 8 more
More Info | Explore related documents