Shelly Calhoun-Jones(@scalhounjones) 's Twitter Profileg
Shelly Calhoun-Jones

@scalhounjones

Lover of art, travel, and coffee. Cloud security professional with a knack for training and a passion for exploring new ideas.

ID:1628463202962116609

linkhttps://www.shellycalhounjones.com calendar_today22-02-2023 18:34:51

33 Tweets

15 Followers

39 Following

Cohesity(@Cohesity) 's Twitter Profile Photo

🔍 Cohesity DataHawk now supports YARA rules and provides pre-packed indicators of compromise (IOC) called a Default Threat Library. Check it out in this post by Shelly Calhoun-Jones: cohesity.co/3P26oVS

🔍 Cohesity DataHawk now supports YARA rules and provides pre-packed indicators of compromise (IOC) called a Default Threat Library. Check it out in this post by @scalhounjones: cohesity.co/3P26oVS #CohesityTAG
account_circle
Cohesity(@Cohesity) 's Twitter Profile Photo

❓Why do you need a new approach to protect against and cybercrime? Because bad actors keep getting more sophisticated. Learn how to isolate and protect your critical Microsoft Azure data on August 17 at 11 AM PT: cohesity.co/3OpaW8K Shelly Calhoun-Jones Nikitha Omkar

❓Why do you need a new approach to protect against #ransomware and cybercrime? Because bad actors keep getting more sophisticated. Learn how to isolate and protect your critical @Azure data on August 17 at 11 AM PT: cohesity.co/3OpaW8K #CohesityTAG @scalhounjones @NikiOmkar
account_circle
Cohesity(@Cohesity) 's Twitter Profile Photo

LIVE! Spotlight on Security . Join Shelly Calhoun-Jones and Brian Wuollet from BigID to explore how DataHawk can help strengthen your security posture and provide valuable data insights. x.com/i/broadcasts/1…

account_circle
Shelly Calhoun-Jones(@scalhounjones) 's Twitter Profile Photo

New article from Microsoft Security on how to protect yourself against cryptojacking. Cryptojacking is where a threat actor uses a victim's compute power to generate cryptocurrency.  microsoft.com/en-us/security…

account_circle
Cybersecurity and Infrastructure Security Agency(@CISAgov) 's Twitter Profile Photo

We published a factsheet, Free Tools for Environments, to help businesses transitioning into a cloud environment identify proper tools and techniques necessary for the protection of critical assets and data security: go.dhs.gov/4ya

We published a factsheet, Free Tools for #Cloud Environments, to help businesses transitioning into a cloud environment identify proper tools and techniques necessary for the protection of critical assets and data security: go.dhs.gov/4ya
account_circle
Clint Gibler(@clintgibler) 's Twitter Profile Photo

Keep up with security research in 10min/week:

📺 Talks
🛠️ Tools and blog posts
🧪 Research projects

Join 17,000+ of the best security professionals:
tldrsec.com

Follow me Clint Gibler for more

account_circle
Shelly Calhoun-Jones(@scalhounjones) 's Twitter Profile Photo

Such a fun week at HPE Discover! It was a pleasure to meet more of the Cohesity crew and deliver a fun session with Sean Kronberg from Blue Origin. Thanks for having me, looking forward to more adventures with my fellow Cohesians. Theresa Miller

Such a fun week at HPE Discover! It was a pleasure to meet more of the @Cohesity crew and deliver a fun session with Sean Kronberg from Blue Origin. Thanks for having me, looking forward to more adventures with my fellow Cohesians. #cohesitytag @24x7ITConnect
account_circle
Clint Gibler(@clintgibler) 's Twitter Profile Photo

💥 Destroyed by Breach

A list of businesses that have actually gone out of business due to a -related incident

By Adrian Sanabria (@[email protected])

docs.google.com/spreadsheets/d…

account_circle
Cohesity(@Cohesity) 's Twitter Profile Photo

📹 In this video, our Principal Technologist Shelly Calhoun-Jones demonstrates how you can use as a service ( ) to back up and recover EC2 and RDS workloads. cohesity.co/3Cu20sZ TAG

account_circle
Clint Gibler(@clintgibler) 's Twitter Profile Photo

📚 tl;dr sec 184

⛈️ Chris Farris (@[email protected]) Public Cloud Security Breaches
🤖 OWASP® Foundation Top 10 for LLMs
🔎 Chris Anley Code Credential Scanner
🍎 Brendan Chamberlain Living Off the Orchard
☁️ How to detect anomalies in AWS
📺 Nicolas Grégoire's Burp tips n tricks

and more!

tldrsec.com/blog/tldr-sec-…

account_circle
Jen Easterly🛡️(@CISAJen) 's Twitter Profile Photo

👉Appreciate Cohesity & Sanjay Poonen for the opportunity to share how important partnerships are in building our collective defense. We’re only as strong as our weakest link, so let’s work together to ensure that we raise the cybersecurity bar for all.

👉Appreciate @Cohesity & @spoonen for the opportunity to share how important partnerships are in building our collective defense. We’re only as strong as our weakest link, so let’s work together to ensure that we raise the cybersecurity bar for all.
account_circle