Current space

Members

Filtered creator directory for "security".

Directory 201.5K Indexed posts 43M Verified 0
Active AuthorsRecent indexed creators Registered MembersAccount directory Completed ProfilesProfiles with public details VerifiedTrusted member signals
201.5KActive members
43MIndexed posts
286KDetailed profiles
41Sources in this view

Active authors

Showing directory results matching your search with real activity counts for visible profiles.

Page 2 | 36 shown
E
Authenticity in Sales: Why it Matters - ESA
Authenticity in Sales: Why it Matters - ESA
Electronic Security Association avatar
@Electronic Security Association
Electronic Security
Jan 29, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Authenticity in Sales: Why it Matters - ESA
esaweb.org
0Following 0Comments 0Views 0Shares
E
Going in-depth on the Windows 10 random number generation infrastructure | Microsoft Security Blog
Going in-depth on the Windows 10 random number generation infrastructure | Microsoft Securi...
Enterprise & Security Team avatar
@Enterprise & Security Team
Enterprise &
Jan 28, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Going in-depth on the Windows 10 random number generation infrastructure | Microsoft Security Blog
microsoft.com
0Following 0Comments 0Views 0Shares
E
Secured-core PCs help customers stay ahead of advanced data theft | Microsoft Security Blog
Force firmware code to be measured and attested by Secure Launch on Windows 10 | Microsoft Security Blog
System Management Mode deep dive: How SMM isolation hardens the platform | Microsoft Security Blog
Secured-core PCs help customers stay ahead of advanced data theft | Microsoft Security Blog
Enterprise and OS Security avatar
@Enterprise and OS Security
Enterprise And
Feb 7, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 6Posts 1Sources 0Reputation
Latest signal 0 reactions
Secured-core PCs help customers stay ahead of advanced data theft | Microsoft Security Blog
microsoft.com
0Following 0Comments 0Views 0Shares
E
3 steps to secure your multicloud and hybrid infrastructure with Azure Arc | Microsoft Security Blog
3 steps to secure your multicloud and hybrid infrastructure with Azure Arc | Microsoft Secu...
Enterprise and OS Security, Abhilash Kankanawadi avatar
@Enterprise and OS Security, Abhilash Kankanawadi
Enterprise And
Feb 7, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
3 steps to secure your multicloud and hybrid infrastructure with Azure Arc | Microsoft Security Blog
microsoft.com
0Following 0Comments 0Views 0Shares
E
SharePoint Under Siege: ToolShell Exploit (CVE-2025-49706 & CVE-2025-49704) - Eye Research
SharePoint Under Siege: ToolShell Exploit (CVE-2025-49706 & CVE-2025-49704) - Eye Research
Eye Security avatar
@Eye Security
Eye Security
Jan 27, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
SharePoint Under Siege: ToolShell Exploit (CVE-2025-49706 & CVE-2025-49704) - Eye Research
research.eye.security
0Following 0Comments 0Views 0Shares
F
2026年もソフトウェアサプライチェーンのリスクに立ち向かうために / Product Security Square #3 - Speaker Deck
ReactのdangerouslySetInnerHTMLは“dangerously”だから危険 / Security.any #09 卒業したいセキュリティLT - Speaker Deck
2026年もソフトウェアサプライチェーンのリスクに立ち向かうために...
flatt_security avatar
@flatt_security
Flatt_security User
Mar 26, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
2026年もソフトウェアサプライチェーンのリスクに立ち向かうために / Product Security Square...
speakerdeck.com
0Following 0Comments 0Views 0Shares
F
The Foundation for Energy Security and Innovation (FESI) Announces Investments to Defend Am...
Foundation for Energy Security and Innovation (FESI) avatar
@Foundation for Energy Security and Innovation (FESI)
Foundation For
Feb 27, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
The Foundation for Energy Security and Innovation (FESI) Announces Investments to Defend America's Critical Infrastru...
prnewswire.com
0Following 0Comments 0Views 0Shares
F
In journalist security field, maturing and understanding - Committee to Protect Journalists
In journalist security field, maturing and understanding - Committee to Protect Journalists
Frank Smyth/CPJ Journalist Security Coordinator avatar
@Frank Smyth/CPJ Journalist Security Coordinator
Frank Smyth/CPJ
Jan 29, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
In journalist security field, maturing and understanding - Committee to Protect Journalists
cpj.org
0Following 0Comments 0Views 0Shares
F
Knowing how law and technology meet at US borders - Committee to Protect Journalists
Knowing how law and technology meet at US borders - Committee to Protect Journalists
Frank Smyth/CPJ Senior Adviser for Journalist Security avatar
@Frank Smyth/CPJ Senior Adviser for Journalist Security
Frank Smyth/CPJ
Feb 7, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Knowing how law and technology meet at US borders - Committee to Protect Journalists
cpj.org
0Following 0Comments 0Views 0Shares
G
Digging Gold with a Spoon – Resurgence of Monero-mining Malware
Digging Gold with a Spoon – Resurgence of Monero-mining Malware
G DATA Security Center avatar
@G DATA Security Center
G DATA
Apr 30, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Digging Gold with a Spoon – Resurgence of Monero-mining Malware
blog.gdatasoftware.com
0Following 0Comments 0Views 0Shares
G
Exploring GenAI in Cybersecurity: Gemini for Malware Analysis
Malware by the (Bit)Bucket: Uncovering AsyncRAT
Analysis: Emmenhtal distributes SmokeLoader malware
Exploring GenAI in Cybersecurity: Gemini for Malware Analysis
G DATA Security Lab avatar
@G DATA Security Lab
G DATA
Feb 2, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 6Posts 1Sources 0Reputation
Latest signal 0 reactions
Exploring GenAI in Cybersecurity: Gemini for Malware Analysis
gdatasoftware.com
0Following 0Comments 0Views 0Shares
G
how to remove MyCouponsmart on macOS |
how to remove MyCouponsmart on macOS |
geeksecurity1 avatar
@geeksecurity1
Geeksecurity1 User
Jan 24, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
how to remove MyCouponsmart on macOS |
applehelpwriter.com
0Following 0Comments 0Views 0Shares
G
GNSI Tampa Summit Series
Global and National Security Institute avatar
@Global and National Security Institute
Global And
Apr 26, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
GNSI Tampa Summit Series
usf.edu
0Following 0Comments 0Views 0Shares
G
allemand – Global Security Mag Online
Site Keywords - Global Security Mag Online
claim - Global Security Mag Online
allemand – Global Security Mag Online
Global Security Mag Online avatar
@Global Security Mag Online
Global Security
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 4Posts 2Sources 0Reputation
Latest signal 0 reactions
allemand – Global Security Mag Online
globalsecuritymag.de
0Following 0Comments 0Views 0Shares
G
GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol | GuidePoint Security
GuidePoint Security researcher discovers vulnerability in the integrity of common HMI clien...
GuidePoint Security avatar
@GuidePoint Security
GuidePoint Security
Jan 24, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 3Posts 1Sources 0Reputation
Latest signal 0 reactions
GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol | GuideP...
guidepointsecurity.com
0Following 0Comments 0Views 0Shares
H
Wi-Fi honeypots: Alive and well at RSAC 2018 - Help Net Security
Supply chain attacks caused more data compromises than malware - Help Net Security
Six common virtualization security risks and how to combat them - Help Net Security
Wi-Fi honeypots: Alive and well at RSAC 2018 - Help Net Security
Help Net Security avatar
@Help Net Security
Help Net
Apr 20, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 65Posts 3Sources 0Reputation
Latest signal 0 reactions
Wi-Fi honeypots: Alive and well at RSAC 2018 - Help Net Security
helpnetsecurity.com
0Following 0Comments 0Views 0Shares
H
Statistics on spam, phishing, viruses, ransomware, and advertising
1 in 3 organizations does not provide any cybersecurity training to remote workers despite a majority of employees having access to critical data - Hornetsecurity – Next-Gen Microsoft 365 Security
Pretexting: 5 Examples of Social Engineering Tactics Used
Statistics on spam, phishing, viruses, ransomware, and advertising
Hornetsecurity avatar
@Hornetsecurity
Hornetsecurity User
Feb 3, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 3Posts 1Sources 0Reputation
Latest signal 0 reactions
Statistics on spam, phishing, viruses, ransomware, and advertising
hornetsecurity.com
0Following 0Comments 0Views 0Shares
H
Forrester Study Recommends Zero Trust Approach to Endpoint Security to Reduce Attack Surface and Improve Productivity | HP Wolf Security
HP Wolf Security Threat Insights Report Q4 2021 | HP Wolf Security
Forrester Study Recommends Zero Trust Approach to Endpoint Security to Reduce Attack Surfac...
HP Wolf Security avatar
@HP Wolf Security
HP Wolf
Apr 19, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
Forrester Study Recommends Zero Trust Approach to Endpoint Security to Reduce Attack Surface and Improve Productivity...
threatresearch.ext.hp.com
0Following 0Comments 0Views 0Shares
H
WordPress Security for High Performance Websites - MalCare
WordPress Security for High Performance Websites - MalCare
http://twitter.com/malcaresecurity avatar
@http://twitter.com/malcaresecurity
Http://twitter.com/malcaresecurity User
Jan 23, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
WordPress Security for High Performance Websites - MalCare
malcare.com
0Following 0Comments 0Views 0Shares
I
The Cost of September 11
IAGS, Institute for the Analysis of Global Security avatar
@IAGS, Institute for the Analysis of Global Security
IAGS, Institute
Jan 29, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
The Cost of September 11
iags.org
0Following 0Comments 0Views 0Shares
I
SPS-Verschlüsselung von Siemens SIMATIC S7-1200/1500 ist angreifbar
SPS-Verschlüsselung von Siemens SIMATIC S7-1200/1500 ist angreifbar
Infopoint Security, Munich, Germany avatar
@Infopoint Security, Munich, Germany
Infopoint Security,
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
SPS-Verschlüsselung von Siemens SIMATIC S7-1200/1500 ist angreifbar
infopoint-security.de
0Following 0Comments 0Views 0Shares
I
Data Security Guide | Information Security
Data Security Guide | Information Security
Information Security avatar
@Information Security
Information Security
Feb 5, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Data Security Guide | Information Security
security.duke.edu
0Following 0Comments 0Views 0Shares
I
Infosecurity Magazine News Team avatar
@Infosecurity Magazine News Team
Infosecurity
No posts yet
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 0Posts 0Sources 0Reputation
Latest signal 0 reactions
No indexed post preview available yet.
Discovery profile
0Following 0Comments 0Views 0Shares
I
Intego's New Total Protection | One solution for Mac Protection
Internet Security Suite X9 for All Mac Devices – Intego
Intego's New Total Protection | One solution for Mac Protection
IntegoSecurity avatar
@IntegoSecurity
IntegoSecurity User
Jan 27, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 2Sources 0Reputation
Latest signal 0 reactions
Intego's New Total Protection | One solution for Mac Protection
intego.com
0Following 0Comments 0Views 0Shares
I
How to Defend Yourself Against NSO Spyware Like Pegasus
How to Defend Yourself Against NSO Spyware Like Pegasus
Intercept Security Team avatar
@Intercept Security Team
Intercept Security
Jan 27, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
How to Defend Yourself Against NSO Spyware Like Pegasus
theintercept.com
0Following 0Comments 0Views 0Shares
J
[20230201] - Core - Improper access check in webservice endpoints
[20230201] - Core - Improper access check in webservice endpoints
Joomla! Security Strike Team avatar
@Joomla! Security Strike Team
Joomla! Security
Jan 23, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 3Posts 1Sources 0Reputation
Latest signal 0 reactions
[20230201] - Core - Improper access check in webservice endpoints
developer.joomla.org
0Following 0Comments 0Views 0Shares
J
Statement by Members of International Law Association Committee on Use of Force
Just Security | Substack
Top Experts' Views of Int'l Court of Justice Ruling on Israel Gaza Operations (South Africa v Israel, Genocide Convention Case)
Statement by Members of International Law Association Committee on Use of Force
Just Security avatar
@Just Security
Just Security
Feb 24, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 26Posts 2Sources 0Reputation
Latest signal 0 reactions
Statement by Members of International Law Association Committee on Use of Force
justsecurity.org
0Following 0Comments 0Views 0Shares
K
Kratos Defense & Security Solutions, Inc. Announces
Kratos Defense & Security Solutions, Inc. Announces
Kratos Defense & Security Solutions, Inc. avatar
@Kratos Defense & Security Solutions, Inc.
Kratos Defense
Apr 20, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Kratos Defense & Security Solutions, Inc. Announces
globenewswire.com
0Following 0Comments 0Views 0Shares
L
NRA Law Enforcement Division | NRA Explore
NRA Law Enforcement Schools | Law Enforcement, Military, Security
Officer Benefits from the NRA | Law Enforcement, Military, Security
NRA Law Enforcement Division | NRA Explore
Law Enforcement, Military, Security avatar
@Law Enforcement, Military, Security
Law Enforcement,
Feb 12, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 4Posts 1Sources 0Reputation
Latest signal 0 reactions
NRA Law Enforcement Division | NRA Explore
le.nra.org
0Following 0Comments 0Views 0Shares
L
After TikTok: Navigating the Complex Web of Foreign Tech Bans - Security Boulevard
After TikTok: Navigating the Complex Web of Foreign Tech Bans - Security Boulevard
Lohrmann on Cybersecurity avatar
@Lohrmann on Cybersecurity
Lohrmann On
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
After TikTok: Navigating the Complex Web of Foreign Tech Bans - Security Boulevard
securityboulevard.com
0Following 0Comments 0Views 0Shares
M
XLM + AMSI: New runtime defense against Excel 4.0 macro malware | Microsoft Security Blog
HAFNIUM targeting Exchange Servers with 0-day exploits | Microsoft Security Blog
XLM + AMSI: New runtime defense against Excel 4.0 macro malware | Microsoft Security Blog
Microsoft 365 Security, Microsoft Threat Intelligence avatar
@Microsoft 365 Security, Microsoft Threat Intelligence
Microsoft 365
Jan 29, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
XLM + AMSI: New runtime defense against Excel 4.0 macro malware | Microsoft Security Blog
microsoft.com
0Following 0Comments 0Views 0Shares
M
Keeping browsing experience in users' hands | Microsoft Security Blog
Case study: How predictive shielding in Defender stopped GPO-based ransomware before it started | Microsoft Security Blog
Insights from one year of tracking a polymorphic threat | Microsoft Security Blog
Keeping browsing experience in users' hands | Microsoft Security Blog
Microsoft Defender Security Research Team avatar
@Microsoft Defender Security Research Team
Microsoft Defender
Mar 28, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 32Posts 1Sources 0Reputation
Latest signal 0 reactions
Keeping browsing experience in users' hands | Microsoft Security Blog
microsoft.com
0Following 0Comments 0Views 0Shares
M
Training People on Threat Modeling | Microsoft Security Blog
SDL Training | Microsoft Security Blog
Global cybersecurity policy: Finding a balance between security and competitiveness | Microsoft Security Blog
Training People on Threat Modeling | Microsoft Security Blog
Microsoft Security avatar
@Microsoft Security
Microsoft Security
Feb 24, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 4Posts 1Sources 0Reputation
Latest signal 0 reactions
Training People on Threat Modeling | Microsoft Security Blog
microsoft.com
0Following 0Comments 0Views 0Shares
M
Recent enhancements for Microsoft Power Platform governance | Microsoft Security Blog
Foundations of Microsoft Flow—secure and compliant automation, part 1
CISO series: Partnering with the C-Suite on cybersecurity | Microsoft Security Blog
Recent enhancements for Microsoft Power Platform governance | Microsoft Security Blog
Microsoft Security Team avatar
@Microsoft Security Team
Microsoft Security
Apr 12, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 41Posts 1Sources 0Reputation
Latest signal 0 reactions
Recent enhancements for Microsoft Power Platform governance | Microsoft Security Blog
microsoft.com
0Following 0Comments 0Views 0Shares
M
300 Billion Emails, Infinite Risk: Email Security Evolution
300 Billion Emails, Infinite Risk: Email Security Evolution
Mike P | Return on Security avatar
@Mike P | Return on Security
Mike P
Jan 27, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
300 Billion Emails, Infinite Risk: Email Security Evolution
returnonsecurity.com
0Following 0Comments 0Views 0Shares
M
How AI Is Changing the Way Yards Stop Cargo Theft - Supply Chain 24/7
How AI Is Changing the Way Yards Stop Cargo Theft - Supply Chain 24/7
Milan Luketic, Birdseye Security Solutions avatar
@Milan Luketic, Birdseye Security Solutions
Milan Luketic,
Jan 29, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
How AI Is Changing the Way Yards Stop Cargo Theft - Supply Chain 24/7
supplychain247.com
0Following 0Comments 0Views 0Shares