optistream(@optistreamio) 's Twitter Profile Photo

Big news today!

We are thrilled to launch Optistream NetTwin!
Result of months of R&D, this groundbreaking solution offers intelligent network maps to secure hybrid infrastructure (inc. AWS). (1/3)

Big news today!

We are thrilled to launch Optistream NetTwin!
Result of months of R&D, this groundbreaking solution offers intelligent network maps to secure hybrid infrastructure (inc. AWS). (1/3)
#cybersecurity #network #OT #cloudsecurity
account_circle
ZITADEL(@zitadel) 's Twitter Profile Photo

Simplify B2B collaboration! Grant access to specific users from other orgs in with external user grants: zitadel.com/docs/concepts/…

Simplify B2B collaboration! Grant access to specific users from other orgs in #zitadel with external user grants: zitadel.com/docs/concepts/… #cloudsecurity #multitenancy
account_circle
SecurPay Coin(@SecurPayCoin) 's Twitter Profile Photo

☁️ Advanced cloud services protect every transaction with SecurCom. Welcome to the next level of financial service security.

🛡️

☁️ Advanced cloud services protect every transaction with SecurCom. Welcome to the next level of financial service security. 

#CloudSecurity #SecurCom #SecurePayments 🛡️
account_circle
Pritish Bali(@skull_88888) 's Twitter Profile Photo

Cloud computing is like having a limitless toolbox where you can access and use various tools and resources whenever and wherever you need them, without worrying about storage or maintenance.

account_circle
Trusted Connectivity Alliance(@_TCAlliance) 's Twitter Profile Photo

Join professionals from industries like , and dive into the and ecosystem at the Cyber Security & Cloud Expo this June 5-6. Topics include tenants of CISO success, security, and more.

Register here: bit.ly/3RSjlmf#CyberE…

Join professionals from industries like #government, #security and dive into the #cybersecurity and #cloud ecosystem at the Cyber Security & Cloud Expo this June 5-6. Topics include tenants of CISO success, #cloudsecurity, and more.

Register here: bit.ly/3RSjlmf#CyberE…
account_circle
XM Cyber(@XMCyber_) 's Twitter Profile Photo

What makes tough? Lack of visibility, inconsistent permissions, blurred ownership...

Hybrid attack path analysis is crucial for complete security. Continuous Threat Exposure Management ( ) helps block critical attack vectors.

Learn: thehackernews.com/2024/04/harnes…

account_circle
Pankaj Mouriya(@Pankajmouriya_) 's Twitter Profile Photo

btw I am on the lookout for security engineer/cloud security roles. If you are someone who is , here is your chance to me😅.

About me and my blog website: noshellaccess.com/aboutme/

My portfolio: pankajmouriya.com

account_circle
Q.B 🛡️(@QuentinBrusa) 's Twitter Profile Photo

Hi Cloudsec community ! I would like to share with you a first iteration of a list of awesome cloud security events/conferences over the year. Feel free to make suggestions!
github.com/qbrusa/Awesome…
fwd:cloudsec Cloud IdentitySummit SecurityWeek SANS Cloud Security

account_circle
Noah Franklin(@iamnoahfranklin) 's Twitter Profile Photo

Cloud security is 🔑! Don't let hackers make your cloud their playground. 🚫 Stay ahead of cyber threats with multi-factor authentication and robust identity protection. Read more: buff.ly/4d5CUSj 🛡️

Cloud security is 🔑! Don't let hackers make your cloud their playground. 🚫 Stay ahead of cyber threats with multi-factor authentication and robust identity protection. Read more: buff.ly/4d5CUSj 🛡️   #cloudsecurity #cybersecurity
account_circle
Terrance DeJesus(@_xDeJesus) 's Twitter Profile Photo

For threat detection in cloud, the logic to identify a threat can be trivial, but discerning between benign and malicious is often the hardest challenge, especially for traditional detection engines that rely on statically defined rules.

account_circle