All the below tweets are in English.
取り急ぎ標記につき以下貼っておきます。
Welcome to Twitter @NSACyber. Check out the link below to learn about #cybersecurity vulnerabilities and how to protect your networks. https://t.co/NenTPH71Ry
— Office of the DNI (@ODNIgov) May 28, 2020
What do the Masters Golf Tournament and the "Godfather of Soul", James Brown, have in common with the NSA? They share the same hometown, Augusta, GA!
NSAG conducts signals intelligence on foreign intelligence targets and cybersecurity operations in the Middle East & Africa. pic.twitter.com/jgz582RwXQ
— NSA/CSS (@NSAGov) May 29, 2020
Just as 9/11 spurred America to change its counterterrorism strategy, repeated digital attacks are doing the same for its cyber-security https://t.co/mwEbXd87f6
— The Economist (@TheEconomist) May 29, 2020
20 Reasons to Let Your Employees Work From Home – https://t.co/nKj3E6zl1d
'
'
'#RemoteWorkforce #ITSolutions #technology #Podcast #entrepreneur #Technologies #ITmanagedservices #technologysolutions #LocalITsupport #CyberSecurity #WorkFromHome pic.twitter.com/dWvwQA6eOL— Trinsic Technologies (@Trinsic) May 28, 2020
The cyber vulnerabilities of a work-at-home government | Opinion https://t.co/7iNEOpXzZ9
— Newsweek (@Newsweek) May 29, 2020
"If you have stalkerware on your phone, it can be really difficult to know whether or not it's there. And one of the reasons for that is because antivirus companies often don't recognize stalkerware as malicious." – EFF Director of Cybersecurity @evacide https://t.co/7Ck4D2b0OH
— EFF (@EFF) May 27, 2020
9 out of 10 account passwords are already in a database owned by criminals. You and your family are not exempted. Check the database now: https://t.co/zLWJUH5Psf pic.twitter.com/BNfHFgwMai
— HackenAI – All-in-One Cybersecurity Suite (@HackenAI) May 26, 2020
Comments to @TorontoStar and @CanadianPress on Huawei 5G and Canada: https://t.co/0ZtQ01RBx4@MLInstitute @AsiaPacificFdn @JIIA_eng @JIIA_jpn @EWInstitute @theciponline
— J. Berkshire Miller (@jbmllr) May 28, 2020
Trudeau says Ottawa undecided on whether to block #Huawei from 5G networks #cdnpoli #CyberSecurity https://t.co/S3egJTAqp8
— Robert Fife (@RobertFife) May 26, 2020
Cyber security review may lead to Huawei loss of UK 5G deal https://t.co/Uh82bFDM1j
— The Guardian (@guardian) May 24, 2020
“We have no friends out there anymore on this issue… the Japanese are absolutely seething with us"
Sir Iain Duncan Smith says "nobody out there” agrees with the UK government's cyber security advisers over Huawei and 5G – "we are alone in this matter"https://t.co/s7iaHOuANz pic.twitter.com/6yXoiLGcfy
— BBC Politics (@BBCPolitics) March 10, 2020
Firms classified as "high-risk vendors" by the National Cyber Security Centre should be removed entirely from the UK's digital infrastructure #Huawei https://t.co/6OHWOGpKvt
— Iain Duncan Smith MP (@MPIainDS) March 10, 2020
https://twitter.com/BrugesGroup/status/1264883423304450048
Important @MrHarryCole story: not clear Huawei can even be a *reliable* supplier now, given that the US have cut off their supply of chips. I hope this is correct and we will buy from firms not wholly owned by a bloodstained dictatorship.https://t.co/RYiCuqqxzk
— Neil O'Brien MP (@NeilDotObrien) May 24, 2020
Germany could learn from France’s top cybersecurity official who has made clear: “We consider telecommunication operators as critical operators. They have to work with us in order to protect our networks. They cannot only try to make money” https://t.co/ulTigJ1Ls8
— Noah Barkin (@noahbarkin) May 26, 2020
Top White House official lays out U.S. case for banning Huawei from Canada’s 5G network – The Globe and Mail #huawei #CyberSecurity #china #cdnpoli #cdneco https://t.co/X2kqOs6SOl
— Robert Fife (@RobertFife) March 10, 2020
@realDonaldTrump sends top adviser to warn against #Huawei – The Globe and Mail #china #CyberSecurity https://t.co/zUqxZEkALR
— Robert Fife (@RobertFife) March 9, 2020
Huawei is willfully violating US sanctions on Iran. They should be prosecuted to the fullest extent of the law and excluded from responsible countries’ information networks. https://t.co/740nby6M8e
— Ruben Gallego (@RepRubenGallego) March 4, 2020
Huawei warns U.S. chip ban will damage operations globally, but some say loopholes remain. https://t.co/d02YTCnaA8
— Real Time Economics (@WSJecon) May 24, 2020
https://twitter.com/coofish1/status/1235503278198124544
.@ENERGY selects UTSA to lead the Cybersecurity Manufacturing Innovation Institute https://t.co/1lpaPFVqW3 #UTSA @CyManII @UTSAResearch pic.twitter.com/X8BdIXYgay
— UTSA (@UTSA) May 27, 2020
MEDIA STATEMENT FROM BDS MALAYSIA
29 May 2020
PROJECT MAGNUM: TIES BETWEEN THE MALAYSIAN GOVERNMENT AND ISRAELI CYBERSECURITY COMPANY#BDSMalaysia #Palestine @BDSmovement @NajibRazak pic.twitter.com/dJfouLyRCh
— BDS Malaysia (@BdsMalaysia) May 29, 2020
What is the dark web? Your questions answered, in plain English https://t.co/7BPMgNHbXJ #cybersecurity #appsec
— Moix Security (@moixsec) May 26, 2020
My paper on the ethics of private/public cybersecurity is now officially out. https://t.co/zSJFtF8d5E
— James Pattison (@jamespattison) May 29, 2020
The Future Of Cybersecurity: Building Resilient Targets That Defend Themselves https://t.co/L2VhZc6ZcV via @inc42
— CYFIRMA (@cyfirma) May 24, 2020
This member of the BBC board is CEO of Crossword Security, a cyber security firm chaired by former MI6 director (and anti-Corbyn propagandist) Richard Dearlove, on whose board also sits former head of the UK military Nick Houghton. https://t.co/SQJkR77I0I pic.twitter.com/1qcPWjHhve
— Mark Curtis (@markcurtis30) May 28, 2020
5 #Tech roles in high demand during the COVID-19 crisis. #Data remains a key source in powering business decisions. #Cybersecurity professionals are skyrocketing in demand as cybercrimes increase.https://t.co/I9Y7rnDzJL… https://t.co/YGuDAouDnc
— Catherine Adenle (@CatherineAdenle) May 29, 2020
"The cutting edge of cybersecurity is moving away from a reactive defense. Instead of analysts waiting for a threat to happen, they are proactively searching out attackers in their environment." Allie Mellen, Cybereason #cyber https://t.co/uDzGb1lbFw
— 780th Military Intelligence Brigade (Cyber) (@780thC) May 28, 2020
New research from @UoY_CS has exposed the vulnerabilities of some commercial password managers: https://t.co/oHURHmri62 #YorkResearch #CyberSecurity
— University of York (@UniOfYork) March 26, 2020
#FletcherDean Emeritus @stavridisj sat down with @DarkReading for a conversation around what role he thinks the government should play in combating #cyber threats and what concerns him the most when it comes to the current #cybersecurity landscape today. https://t.co/KuufYqlcKz
— The Fletcher School (@FletcherSchool) March 6, 2020
A new Maryland bill would ask the state’s Department of Information Technology to develop a baseline plan for localities within the state to help battle cyber attacks. https://t.co/hgNTfEmRuP
— WJZ | CBS Baltimore (@wjz) February 5, 2020
In light of #DataPrivacyDay, we're re-upping an article from #FletcherProf @josephinecwolff in @BostonGlobe on the "routine, standard #security" measures governments need to take to protect citizens from #cybersecurity risks. https://t.co/9mBB5iN4GG
— The Fletcher School (@FletcherSchool) January 28, 2020
https://twitter.com/USNATO/status/1202181582397878272
Cyber hacks are a continuous threat, with over 90% of UK businesses suffering some form of cyber security breach in 2017. Discover how you can protect your office: https://t.co/qNm6CC24JC pic.twitter.com/EDXHGjkImO
— Canon Business UK (@CanonBusinessUK) December 19, 2019
https://twitter.com/ChicagoCouncil/status/1220030256112971776
'Nowhere is the gap between expert knowledge and leaders’ understanding greater than in the area of cyber conflict'. This does not bode well for the decade ahead. Columbia University Professor Robert Jervis writes in our 2020 Survey. https://t.co/kHRUIPcuMF
— Leslie Vinjamuri (@londonvinjamuri) December 23, 2019
The Fall/Winter edition of the student-run @PD_mag is now available! This issue focuses on cooperation in the digital age by tackling all angles of #CyberDiplomacy. Read it here: https://t.co/THWsVxNojR#PublicDiplomacy @USC_SPD @USC @USCAnnenberg #ascj pic.twitter.com/f9v1J4xet3
— USC Public Diplomacy (@PublicDiplomacy) December 18, 2019
Russian hacker behind an elite crime forum pleads guilty to multiple charges https://t.co/qAX9PKzrNX pic.twitter.com/v5qfncHnML
— Engadget (@engadget) January 28, 2020
What is email spoofing awareness? Learn more about it in our brand new video.#aberdeen #aberdeenshire #cyber #security #cybersecurity #it #email #fraud #prevention #business #data #risk #video #guide pic.twitter.com/yQpRrnBJHc
— Aberdeen Cyber Security (@AberdeenCyber) November 6, 2019
https://twitter.com/jennycohn1/status/1191825973265584129
What will be the most in-demand skill set in 10 years? #BofATech
— Bank of America Business Insights (@BofA_Business) October 15, 2019
#TechTrends: As cyber security gets more and more complex, how can businesses stay a step ahead? https://t.co/sDiQIQurGA
— J.P. Morgan (@jpmorgan) October 10, 2019
https://twitter.com/DSMeu/status/1181978127557378055
Cyberattacks from 'hostile nation states' foiled by UK Cyber Centre https://t.co/hyuhL1Sjqe
— SkyNews (@SkyNews) October 23, 2019
Latest commentary from @oiioxford expert @RosariaTaddeo on cyber warfare – Experts struggle to set red lines for cyber warfare https://t.co/i3JlG9KhR8 via @financialtimes
— Oxford Internet Institute (@oiioxford) October 1, 2019
Hackers associated with the Chinese government compromised websites frequented by ethnic minority Uyghurs earlier this year, programming them to install monitoring implants to spy on the phones of users that visited them, according to researchers https://t.co/9lSNOnOF5t
— CNN (@CNN) September 5, 2019
Hackers Have Just Put 620 Million Accounts Up For Sale On The Dark Web — Are You On The List? https://t.co/2PNO4bwDmQ
— Chuck Brooks (@ChuckDBrooks) July 29, 2019
Anonymous apps risk fuelling cyberbullying but they also fill a vital role. @ConversationUK piece by @Steviemo8 and @KillianOLeary ➡️ https://t.co/dsIGKhA74M
— Essex Business School (@Essex_EBS) July 19, 2019
Why is America making an enemy out of Huawei? https://t.co/rm4EiEVsz6 pic.twitter.com/gsBBX0H2DU
— The Economist (@TheEconomist) November 13, 2019
With the Internet now a global battlefield, how serious a threat do cyberweapons pose to America’s economy and infrastructure? @Jason_Healey discusses "The Age of Cyberwarfare" in a Q&A with @columbiamag: https://t.co/Z6NM65dtOw
— Columbia | SIPA (@ColumbiaSIPA) June 10, 2019
Who's best equipped to keep computer science fair and unbiased? Computer scientists. By Ariel Procaccia, CSD Assoc. Professor. https://t.co/w4UrVyHIfs via @bopinion
— CMU Computer Science Department (@CSDatCMU) March 7, 2019
Cybersecurity is a field dominated by men, but women run all three of @CarnegieMellon's cyber research divisions, as well as the university's infosec team. Read about what @lorrietweet and Kathleen Carley, both of @isrcmu, and colleagues are doing https://t.co/UIVolCuViy @CyLab pic.twitter.com/phNPsAWfZL
— CMU School of Computer Science (@SCSatCMU) March 27, 2019
"Why does DoD struggle in using Machine Learning to automate decision making?" @eykanal https://t.co/wYm06gtPGN#MachineLearning
— CERT Division (@CERT_Division) July 27, 2018
Lean More About our Work in the #Xview Challenge: Using Machine Learning and Artificial Intelligence to Help the Federal Government with Disaster Relief #HADR – https://t.co/sM2fTbnoA5 pic.twitter.com/ZaCeJrJZKZ
— Software Engineering Institute (@SEI_CMU) January 28, 2019
Our very own @hollenbarmer and her awesome fish fry map! https://t.co/wuAxhuzKEl
— CMU SEI ETC (@sei_etc) March 1, 2019
China hacked US manufacturing group during trade talks: report https://t.co/pFBK8Pbzjf pic.twitter.com/dc6hLKvY5W
— The Hill (@thehill) November 13, 2019
We have a new call for papers for a special issue on INTERNET CONSOLIDATION that we are working on in partnership with @internetsociety. Check out the details of the call here https://t.co/d2FAlEBuKX, reach out if you have the needed expertise and please help us spread the word.
— Cyber Policy Journal (@CHCyberPolicy) March 1, 2019
Canadian #Hacker who hacked 500 Million #Yahoo accounts has been jailed for 5 years and ordered to pay a $250,000 fine.https://t.co/A3EVu35BE4#ShredShop of #Memphis #ShredPast #ProtectFuture #Shredding #FileStorage #HardDriveDestruction #DataBreaches #IdentityTheft
— Shred Shop Memphis (@ShredMemphis) June 12, 2018
NCSC's report on nationally significant New Zealand organisations’ cyber resilience makes interesting reading – while it shows that we're making progress as a country, we're probably not getting there quickly enough to match the risks faced https://t.co/953C2uBGbD
— KPMG NZ Cyber (@KPMGNZ_Cyber) November 1, 2018
#Cybersecurity is a growing and evolving field, and 2019 is sure to see more changes throughout the industry. This article from @Forbes takes a look at some of the emerging trends poised to dominate the industry in the new year: https://t.co/RUWEJ1ttI8
— cybersecurity@berkeley (@BerkeleyCyber) December 20, 2018
The U.S. Government announced today that a group of Chinese #Cyber actors is carrying out a campaign of #cyber-enabled theft targeting global managed service providers, cloud service providers, and their clients. https://t.co/36lt24NgoT
More at: https://t.co/HUXvRs96Yt— Cybersecurity and Infrastructure Security Agency (@CISAgov) December 20, 2018
"Serbian police may have arrested a suspected member of The Dark Overlord hacking crew, but someone in control of the group's email account told Motherboard "we're still here."" #DarkOverlord #Infosec https://t.co/In3nPiZSHK
— CybIntelligence (@Cybintelligence) January 3, 2019
Hackers Leak Personal Data from Hundreds of German Politicians, Artists, Journalists and YouTube Celebrities On Twitterhttps://t.co/T4axGIE8E6
Leaked data includes phone numbers, email addresses, private chats, bills, credit card information and photos of victims' IDs. pic.twitter.com/1pK6EpKSln
— The Hacker News (@TheHackersNews) January 4, 2019
'Protecting Democracy in an Era of Cyber Information War' – by Joseph Nye, in @HooverInst "The Information Challenge to Democracy" https://t.co/5mRSoUcK8D #sharppower #softpower
— Christopher Walker (@Walker_CT) November 11, 2018
Leading expert @PaulTimmers from @OxfordCTGA takes a look at how cybersecurity is forcing a rethink of strategic autonomy https://t.co/MLX8uYdoLv #CyberSecurity #TechnologyGlobalAffairs pic.twitter.com/V3nYVZxq4o
— OxPol (@OxPolBlog) September 14, 2018
#LSU researchers are working to prevent a cyber attack to our nation’s infrastructure. Watch and read: https://t.co/Xcyau1xZpY#CyberSecurityAwarenessMonth pic.twitter.com/fV4JJSWF2h
— LSU (@LSU) October 4, 2018
Quantum Communication holds the potential to make #hacking a thing of the past. Read here to know more: https://t.co/6iePDVNvZK#Purdue #Internet #CyberSecurity pic.twitter.com/BF42weppRA
— CSO India (@cso_india) October 18, 2018
30 years ago, the world's first cyberattack set the stage for modern cybersecurity challenges, writes @cyberpeaceprof https://t.co/pOaBn3jtWY via @ConversationUS
— IUMaurerLaw (@IUMaurerLaw) November 1, 2018
Shift from a reactive to proactive stance to address weaknesses — before the cyberattacks happen. https://t.co/Ug9kkpmL99
— MIT Sloan School of Management (@MITSloan) November 7, 2018
https://twitter.com/FletcherSchool/status/1059634028524027904
GDPR Privacy Law Lets Breach Victims Seek 'Non-Material Damage' Compensation #privacy #hacking #cybersecurity #breach https://t.co/LqbqXJfKmO
— Bart Grover (@bartgrover) September 10, 2018
A cyber attack can cost companies £1300-£3000 but the damage can be far wider. Is your business protected? Check out our new Cyber Essentials Voucher Scheme for up to £1000 of support https://t.co/M9CQCwEkGR pic.twitter.com/wSHQxwkD7o
— Scottish Enterprise (@scotent) November 7, 2018
It said while the number of victims might be small the damage was huge and calculates the cost to family and friends of the unpaid hours spent dealing with the damage at $347 million a year. https://t.co/NnZRTzxOb2
— CCRI (@CCRInitiative) October 30, 2018
A few weeks ago, our data security approach was presented at the Kaspersky Conference. Because video data is often highly critical and sensitive, we drive a systematic approach by considering physical safety and cybersecurity simultaneously. More: https://t.co/bkJb4c3HB4 pic.twitter.com/7R2BMo84M3
— Bosch Security EMEA (@BoschSecurityEU) October 30, 2018
The ECSO Cybersecurity Market Radar aims to be the up-to-date representation of the innovative European #cybersecurity industry. Hereby, the European cybersecurity companies are invited to contribute to the constant development of the Radar. More info: https://t.co/U96W8tL6LS pic.twitter.com/pXvVgsb8W4
— ECSO (@ecso_eu) November 5, 2018
Read all about the European IoT security and privacy cluster and the recent projects that have received funding from @EU_H2020 , #Security #CyberSecurity #IoT https://t.co/oWwBHcXsza
— SOFIE (@EU_Sofie) November 6, 2018
One year ago, Citizen Lab showed that spyware technology was being used to target journalists & human rights defenders in Mexico. Here @tumbolian explains how tools meant to track criminals turned into the biggest surveillance scandal in Mexican history https://t.co/LqjRGsQwZs
— Citizen Lab (@citizenlab) June 22, 2018
New @AUTuni @PolicyObsAUT working paper says "most IT security experts believe online voting cannot be secure" & "There is no increase in youth turnout when online voting is adopted" https://t.co/EVgZiAiNSy pic.twitter.com/cYsB9loSPU
— PolicyObservatoryAUT (@PolicyObsAUT) December 13, 2018