lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

55
active users

#InformationSecurity

3 posts3 participants0 posts today
Juliet Merida, Dum Tran Elf 🏳️‍⚧️<p><span>Are any of my Fedi peeps attending Crowdstrike's Fal.con in Vegas next month? Wanna meet up?<br><br></span><a href="https://merida.hair/tags/cybersecurity" rel="nofollow noopener" target="_blank">#cybersecurity</a> <a href="https://merida.hair/tags/InformationSecurity" rel="nofollow noopener" target="_blank">#InformationSecurity</a> <a href="https://merida.hair/tags/Crowdstrike" rel="nofollow noopener" target="_blank">#Crowdstrike</a></p>
Edwin G. :mapleleafroundel:<p>Cisco discloses data breach impacting Cisco.com user accounts</p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-discloses-data-breach-impacting-ciscocom-user-accounts/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisco-discloses-data-breach-impacting-ciscocom-user-accounts/</span></a><br>- - -<br>Cisco divulgue une dérobation de données affectant les comptes d'utilisateurs de Cisco.com</p><p>// Article en anglais //</p><p><a href="https://mstdn.moimeme.ca/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://mstdn.moimeme.ca/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://mstdn.moimeme.ca/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.moimeme.ca/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a> <a href="https://mstdn.moimeme.ca/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://mstdn.moimeme.ca/tags/TI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TI</span></a> <a href="https://mstdn.moimeme.ca/tags/InformationTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationTechnology</span></a> <a href="https://mstdn.moimeme.ca/tags/Technologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technologies</span></a></p>
diffractcolours<p>"Don't commit further data breaches while reporting data breaches" challenge: impossible.</p><p>I don't actually need to know the exact PII you leaked, and I haven't asked for it!</p><p><a href="https://tech.lgbt/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://tech.lgbt/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://tech.lgbt/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Early Modern Diplomacy<p>Lobenwein and Rous emphasise that, when studying diplomatic practice and the transfer of information, the interplay between orality, writing and other media is crucial; this also applies when dealing with the practices of espionage. Information that was supposed to remain secure was mainly transmitted orally. (6/7) </p><p><a href="https://hcommons.social/tags/emdiplomacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emdiplomacy</span></a> <a href="https://hcommons.social/tags/NewDiplomaticHistory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NewDiplomaticHistory</span></a> <a href="https://hcommons.social/tags/espionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>espionage</span></a> <a href="https://hcommons.social/tags/history" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>history</span></a> <a href="https://hcommons.social/tags/histodons" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>histodons</span></a> <a href="https://hcommons.social/tags/earlyModern" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>earlyModern</span></a> <a href="https://hcommons.social/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a></p><p><span class="h-card" translate="no"><a href="https://wisskomm.social/@MaxWeberStiftung" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>MaxWeberStiftung</span></a></span> <span class="h-card" translate="no"><a href="https://a.gup.pe/u/histodons" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>histodons</span></a></span> <span class="h-card" translate="no"><a href="https://a.gup.pe/u/historikerinnen" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>historikerinnen</span></a></span> <span class="h-card" translate="no"><a href="https://a.gup.pe/u/earlymodern" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>earlymodern</span></a></span> <span class="h-card" translate="no"><a href="https://historians.social/@womenknowhistory" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>womenknowhistory</span></a></span></p>
Edwin G. :mapleleafroundel:<p>What is quishing?</p><p><a href="https://www.cbc.ca/news/canada/qr-code-scams-quishing-1.7587253" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cbc.ca/news/canada/qr-code-sca</span><span class="invisible">ms-quishing-1.7587253</span></a><br>- - -<br>Qu’est-ce l’hameçonnage par code 2D?</p><p>// Article en anglais //</p><p><a href="https://mstdn.moimeme.ca/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://mstdn.moimeme.ca/tags/Quishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quishing</span></a> <a href="https://mstdn.moimeme.ca/tags/QRCode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QRCode</span></a> <a href="https://mstdn.moimeme.ca/tags/Hame%C3%A7onnage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hameçonnage</span></a> <a href="https://mstdn.moimeme.ca/tags/Code2D" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Code2D</span></a> <a href="https://mstdn.moimeme.ca/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.moimeme.ca/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://mstdn.moimeme.ca/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a></p>
Pen Test Partners<p>Can AI help you examine leaked data safely?<br>If you do it right, it can...</p><p>In this blog post, our Luke Davis looks at how internal chatbot systems, built on private large language models, can support forensic investigations.</p><p>He shows how AI can help find important information in big datasets and speed up analysis.</p><p>📌Read here: <a href="https://www.pentestpartners.com/security-blog/using-ai-chatbots-to-examine-leaked-data/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/using-ai-chatbots-to-examine-leaked-data/</span></a></p><p>To make sure the AI output is correct, it should always be checked against the raw dataset.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/DataSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataSecurity</span></a> <a href="https://infosec.exchange/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a></p>
Brian Anderson (He/Him)<p>If you have to notify a small biz that they’ve been compromised (especially if you have to ask awkward questions about their security posture), try to remember to be kind. </p><p>Look to be empathetic rather than smug. </p><p>Yes, you infosec genius, you’ve seen and done it all and you have earned a jaded moment (and those of us in the business will pat you on the back later). Just, keep it to yourself a little, because shame and gloating is not a part of anyone’s remediation plan.</p><p><a href="https://infosec.exchange/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a><br><a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Jack Rendor<p>Hi everyone! I recently released 3 blog posts! <br>All of them are writeups on CTFs where I make some scripts and tools in bash and golang!</p><p>I'll leave you the link of the blog posts and if you have any suggestions or interact with me, don't hesitate to comment or DM me! </p><p>I hope you all can enjoy reading them!</p><p><a href="https://blog.jackrendor.dev/posts/tryhackme-securityfootage/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.jackrendor.dev/posts/tryh</span><span class="invisible">ackme-securityfootage/</span></a></p><p><a href="https://blog.jackrendor.dev/posts/tryhackme-bugged/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.jackrendor.dev/posts/tryh</span><span class="invisible">ackme-bugged/</span></a></p><p><a href="https://blog.jackrendor.dev/posts/tryhackme-eavesdropper/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.jackrendor.dev/posts/tryh</span><span class="invisible">ackme-eavesdropper/</span></a></p><p><a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/penetrationtest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>penetrationtest</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/bash" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bash</span></a> <a href="https://infosec.exchange/tags/golang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>golang</span></a></p>
Blaise Pabón - controlpl4n3US Pol, adult language
earthling<p>Information Security and Privacy Quick Reference: The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer by Mike Chapple et al, 2025</p><p>A fast, accurate, and up-to-date desk reference for information security and privacy practitioners everywhere.</p><p><span class="h-card" translate="no"><a href="https://a.gup.pe/u/bookstodon" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bookstodon</span></a></span> <br><a href="https://mastodon.social/tags/books" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>books</span></a> <br><a href="https://mastodon.social/tags/nonfiction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nonfiction</span></a> <br><a href="https://mastodon.social/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <br><a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <br><a href="https://mastodon.social/tags/Wiley" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wiley</span></a></p>
Edwin G. :mapleleafroundel:<p>Protecting your SIN is paramount, because it is the master key 🔑 to your identity in Canada 🇨🇦 . And it is really difficult to change. </p><p>Most places don’t need it and should never ask it. Of course, your workplace needs it for your T4/R1 tax slip, the same for the bank. But your landlord or ISP really do not.</p><p>Me: that’s why I never allowed SINs to transmit over email. One can’t leak something they don’t have.</p><p><a href="https://www.cbc.ca/radio/costofliving/sin-protection-fraud-1.7571376" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cbc.ca/radio/costofliving/sin-</span><span class="invisible">protection-fraud-1.7571376</span></a></p><p><a href="https://mstdn.moimeme.ca/tags/Canada" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Canada</span></a> <a href="https://mstdn.moimeme.ca/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://mstdn.moimeme.ca/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mstdn.moimeme.ca/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://mstdn.moimeme.ca/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.moimeme.ca/tags/SIN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIN</span></a></p>
Roxanne :archlinux:<p>There’s a vulnerability that is unique within <a href="https://mastodon.nl/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a>: the human condition of fallibility. It cannot be patched, it can only be hardened against. <a href="https://mastodon.nl/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Edwin G. :mapleleafroundel:<p>It turns out that the Canadian privacy commissioner 🇨🇦 also participated in the 23andMe investigation. They say that they cannot fine 23andMe. </p><p><a href="https://www.cbc.ca/news/politics/23andme-data-breach-investigation-1.7563238?cmp=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cbc.ca/news/politics/23andme-d</span><span class="invisible">ata-breach-investigation-1.7563238?cmp=mastodon</span></a><br>- - -<br>Il se trouve que le Commissaire à la vie privée du Canada 🇨🇦 a également participé à l’enquête concernant 23andMe. Ils disent qu’ils ne peuvent pas mettre 23andMe à l’amende.</p><p><a href="https://www.priv.gc.ca/fr/nouvelles-du-commissariat/nouvelles-et-annonces/2025/info_23andme_250617/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">priv.gc.ca/fr/nouvelles-du-com</span><span class="invisible">missariat/nouvelles-et-annonces/2025/info_23andme_250617/</span></a></p><p><a href="https://mstdn.moimeme.ca/tags/Canada" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Canada</span></a> <a href="https://mstdn.moimeme.ca/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a> <a href="https://mstdn.moimeme.ca/tags/UnitedKingdom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedKingdom</span></a> <a href="https://mstdn.moimeme.ca/tags/RoyaumeUni" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RoyaumeUni</span></a> <a href="https://mstdn.moimeme.ca/tags/23andMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>23andMe</span></a> <a href="https://mstdn.moimeme.ca/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://mstdn.moimeme.ca/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.moimeme.ca/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a></p>
Edwin G. :mapleleafroundel:<p>23andMe has been fined by the UK 🇬🇧 Information Commissioner’s Office £2.31M for failing to protect sensitive information.</p><p><a href="https://www.bleepingcomputer.com/news/security/uk-fines-23andme-for-profoundly-damaging-breach-exposing-genetics-data/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/uk-fines-23andme-for-profoundly-damaging-breach-exposing-genetics-data/</span></a><br>- - -<br>23andMe a reçu une amende de 2,31M£ par le Bureau du commissaire à l’information du Royaume-Uni pour ne pas avoir protégé les informations sensibles.</p><p>// Article en anglais //</p><p><a href="https://mstdn.moimeme.ca/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a> <a href="https://mstdn.moimeme.ca/tags/UnitedKingdom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedKingdom</span></a> <a href="https://mstdn.moimeme.ca/tags/RoyaumeUni" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RoyaumeUni</span></a> <a href="https://mstdn.moimeme.ca/tags/23andMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>23andMe</span></a> <a href="https://mstdn.moimeme.ca/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://mstdn.moimeme.ca/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.moimeme.ca/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a></p>
Edwin G. :mapleleafroundel:<p>WestJet is dealing with a cybersecurity incident on internal systems and the WestJet app.</p><p>Press release: <a href="https://www.westjet.com/en-ca/news/2025/advisory--cybersecurity-incident-" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">westjet.com/en-ca/news/2025/ad</span><span class="invisible">visory--cybersecurity-incident-</span></a><br>Article: <a href="https://www.cbc.ca/news/canada/calgary/westjet-cybersecurity-incident-1.7561474" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cbc.ca/news/canada/calgary/wes</span><span class="invisible">tjet-cybersecurity-incident-1.7561474</span></a><br>- - -<br>WestJet est aux prises avec un incident de cyber sécurité sur leurs systèmes internes et l’app WestJet.</p><p>Communiqué de presse: <a href="https://www.westjet.com/fr-ca/nouvelles/2025/avis-incident-lie-a-la-cybersecurite" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">westjet.com/fr-ca/nouvelles/20</span><span class="invisible">25/avis-incident-lie-a-la-cybersecurite</span></a></p><p><a href="https://mstdn.moimeme.ca/tags/Canada" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Canada</span></a> <a href="https://mstdn.moimeme.ca/tags/WestJet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WestJet</span></a> <a href="https://mstdn.moimeme.ca/tags/AirTravel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AirTravel</span></a> <a href="https://mstdn.moimeme.ca/tags/TransportA%C3%A9rien" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TransportAérien</span></a> <a href="https://mstdn.moimeme.ca/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.moimeme.ca/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://mstdn.moimeme.ca/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a></p>
earthling<p>Practical Information Security: A Competency-Based Education Course by Izzat Alsmadi et al, 2018</p><p>This textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. </p><p><a href="https://link.springer.com/book/10.1007/978-3-319-72119-4" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">link.springer.com/book/10.1007</span><span class="invisible">/978-3-319-72119-4</span></a></p><p><span class="h-card" translate="no"><a href="https://a.gup.pe/u/bookstodon" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bookstodon</span></a></span> <br><a href="https://mastodon.social/tags/books" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>books</span></a> <br><a href="https://mastodon.social/tags/nonfiction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nonfiction</span></a> <br><a href="https://mastodon.social/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a></p>
War on the Castle, Peace in the Valley🛡️🍉🇵🇸 🏳️‍🌈 🇺🇦#cybersecurity experts please comment is this just an urban legend or is it true. Web search is a spaghetti monster of differing opinion, mostly non-expert spec. The claim is roughly to the effect that Internet meme that claims that Apple’s new AI features in iOS 18—and possibly earlier versions updated to 18.1—can scan or access Signal messages and read your content unless you disable the AI. Kind of reminds me of all the virus alerts that used to flood the net as a sort of self-replicating spam. Even the National Lawyers Guild folks have weighed in with inconclusive and conflicting information. I am deep in the space of activists concerned with the matter but none of us have the #infosec expertise to really know what to believe here #encryption #AI #Apple #Signal #informationsecurity
AJCxZ0<p>The best movie ever with an Information Security theme is now available to see and hear at its best.</p><p><a href="https://www.blu-ray.com/movies/Sneakers-4K-Blu-ray/343185/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">blu-ray.com/movies/Sneakers-4K</span><span class="invisible">-Blu-ray/343185/</span></a></p><p> "There's a war out there, old friend - a world war - and it's not about who's got the most bullets. It's about who controls the information: what we see and hear, how we work, what we think. It's all about the information" - Cosmo</p><p><a href="https://infosec.exchange/tags/Sneakers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sneakers</span></a> <a href="https://infosec.exchange/tags/NoMoreSecrets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoMoreSecrets</span></a> <a href="https://infosec.exchange/tags/SetecAstronomy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SetecAstronomy</span></a> <a href="https://infosec.exchange/tags/Movies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Movies</span></a> <a href="https://infosec.exchange/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://infosec.exchange/tags/UHDBD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UHDBD</span></a> <a href="https://infosec.exchange/tags/UHD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UHD</span></a> <a href="https://infosec.exchange/tags/4K" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>4K</span></a> <a href="https://infosec.exchange/tags/HDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HDR</span></a> <a href="https://infosec.exchange/tags/DolbyVision" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DolbyVision</span></a> <a href="https://infosec.exchange/tags/DTSHDMasterAudio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DTSHDMasterAudio</span></a></p>
Juliet Merida, Dum Tran Elf 🏳️‍⚧️<p><span>Hey, Security fedi! Got any recommendations for web app and external network penetration test vendors? Who's your favorite and why?<br><br></span><a href="https://merida.hair/tags/InformationSecurity" rel="nofollow noopener" target="_blank">#InformationSecurity</a> <a href="https://merida.hair/tags/CyberSecurity" rel="nofollow noopener" target="_blank">#CyberSecurity</a></p>
Juliet Merida, Dum Tran Elf 🏳️‍⚧️<p><span>NIST released revision 3 of their security incident response document, the amazing 800-61r3 in April. I haven't read it yet, but I poured over the initial public draft a few months ago and it's really solid.<br><br>If you're interested in cybersecurity incident response, it's definitely worth a read:<br></span><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r3.pdf" rel="nofollow noopener" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r3.pdf</a><span><br><br></span><a href="https://merida.hair/tags/Cybersecurity" rel="nofollow noopener" target="_blank">#Cybersecurity</a> <a href="https://merida.hair/tags/IncidentResponse" rel="nofollow noopener" target="_blank">#IncidentResponse</a> <a href="https://merida.hair/tags/InformationSecurity" rel="nofollow noopener" target="_blank">#InformationSecurity</a></p>