@harminator Profile picture

harminator

@harminator

A tech guy, cybersecurity & helping people understand tech.

Joined December 2008
Similar User
Luke Humberdross photo

@x86_n64

Nate J photo

@LongGameFit

Gknole photo

@GkglassGreg

Olivia photo

@oliviafalcon_

gladys⸆⸉ photo

@gloomybb

Bril Amsterdam photo

@BrilAmsterdam

Austine_Blaise😇😎 photo

@janded_home_boi

George Lavasidis photo

@glavasidis

Λng photo

@anghnd

What is the best compliance validation tool? #compliance #nist #csf ##SecurityInsights


What does this mean…. Word for word? I hardly post about politics, but this needs to be understood..

Trump: You have to get out and vote. You won’t have to do it anymore. Four years, it will be fixed, it will be fine. You won’t have to vote anymore.. In four years, you won’t have to vote again.



I was looking at UNODA - Cyber Diplomacy 1. Cooperation for Stability 2. Duty of Care 3. No nation user of territory for malicious cyberactivities and 8 more. I doubt any nation state complies with one! #CyberSecurity #UNODA #Compliance


It’s quite true! Nothing Smart in this house! If I leave the house and I don’t know what’s in the fridge, too effing bad.

Tweet Image 1

Widom quote: Put your brain in motion before you put your mouth in gear! #Wisdom #senselife #Management


Been using some IT compliance tools. @RapidFireTools Its pretty amazing how much compliance has evolved over the last 15 years. #Compliance #CIS #CISO #NISTCSF


harminator Reposted

Bad debate nights happen. Trust me, I know. But this election is still a choice between someone who has fought for ordinary folks his entire life and someone who only cares about himself. Between someone who tells the truth; who knows right from wrong and will give it to the…


So I have been working closely with CyberSec stuff. The amount of misinformation boggles my mind! top of that the certification authorities are making it more and more complex for the average business person to understand why the safeguards & controls are being put in place!


harminator Reposted

12 clear signs of a high-performing employee: And how to implement them. (Learnt from recruiting 500+ people across 15 years)

Tweet Image 1

harminator Reposted

Top 12 Types of Cyber Attacks

Tweet Image 1

harminator Reposted

During #BHUSA Briefing "Windows Kernel Rootkit Techniques" attendees will get a unique perspective on the offensive and defensive aspects of Windows kernel security and its applicability to contemporary rootkits. Register now >> bit.ly/3K6aXg4

Tweet Image 1

harminator Reposted

While the Indian cricket team often plays football to warm-up, the English football team is playing a form of Kabaddi during practice ahead of the FIFA World Cup



What do you think are the most common reasons of a data breach?

Europol Investigating Breach After Hacker Offers to Sell Classified Data securityweek.com/europol-invest…



harminator Reposted

Asked league about this, and they note that all incidents of potential foul play are reviewed. At this point, league spokesman tells me he's not aware of any fine forthcoming or hearing scheduled for this incident.

In his presser Tocchet mentioned the league had a couple things to look at including a Hyman cross check. Has to be this one below. I’m told Zadorov needed stitches to close up a cut on his face. #canucks



It’s going to get scary online this year!

If your customer support team still relies on knowledge based authentication (KBA) like the easy to find mother’s maiden name, address, birthday, etc, it’s going to become increasingly easy for an attacker to programmatically perform account takeover using AI support calls.



Loading...

Something went wrong.


Something went wrong.