Ben Thurston Profile
Ben Thurston

@BThurstonCPTECH

Followers
257
Following
3
Media
16K
Statuses
27K

Joined September 2014
Don't wanna be here? Send us removal request.
@BThurstonCPTECH
Ben Thurston
4 years
CyberSecManaged: The latest The cybersecurity Daily! Thanks to @BThurstonCPTECH @hasdid @test2v #cybersecurity #infosec.
0
0
0
@BThurstonCPTECH
Ben Thurston
4 years
Operationalizing data science projects it is not an easy task. Join this virtual user group meeting with Jed Dougherty, VP of Field Engineering at @Dataiku, who will discuss best practices for operationalizing #datascience and #ML 
0
0
0
@grok
Grok
5 days
Turn old photos into videos and see friends and family come to life. Try Grok Imagine, free for a limited time.
709
1K
5K
@BThurstonCPTECH
Ben Thurston
4 years
SentinelOne : 📘 Get your comprehensive reference and guided tutorial on how to detect, respond, and prevent #macOS cyberthreats. Download now! . #cybersecurity #infosec #threathunting
Tweet media one
Tweet card summary image
assets.sentinelone.com
This guide covers how to detect malware on an Apple Mac computer. Learn how macOS malware persists and behaves, and how to find evidence of its activity.
0
1
1
@BThurstonCPTECH
Ben Thurston
4 years
We've got the whole @Siemens crew representing at #SnowflakeSnowday!. Hear their journey of moving from monolithic, siloed systems to a globally distributed data mesh enabled by Snowflake
Tweet media one
0
0
0
@BThurstonCPTECH
Ben Thurston
4 years
SentinelOne : 📝 Learn how security researchers write #malware signatures, and understand both their strengths and weaknesses in identifying and detecting malware. #filesignature #cybersecurity #endpointprotection #infosec #malwaresignatures #securi….
sentinelone.com
Learn how security researchers write malware signatures, and understand both their strengths and weaknesses in identifying and detecting malware.
0
1
0
@BThurstonCPTECH
Ben Thurston
4 years
SentinelOne : 🇺🇸 SentinelOne gives our sincerest thanks to all U.S. armed forces veterans who dedicated their lives to defend and preserve our nation’s peace and security. Happy Veterans Day! . #veteransday #veteran #military
Tweet media one
0
0
0
@BThurstonCPTECH
Ben Thurston
4 years
Following our partnership announcement, we’re thrilled to announce that Snowflake Ventures is investing in @HabuHub, a global innovator in data clean room software, which enables data collaboration between Snowflake customers without moving or copying da…
0
0
1
@BThurstonCPTECH
Ben Thurston
4 years
SentinelOne : ✨ Feature Spotlight! Singularity Signal harnesses #data at scale to predict adversaries’ next moves and help you stay a step ahead. By @milad_aslaner and Vivian Ma. Learn more: #singularitysignal #cybersecurity #infosec #threatintelligence.
Tweet card summary image
sentinelone.com
Singularity Signal harnesses data at scale to predict adversaries’ next moves and help you stay a step ahead.
0
4
0
@BThurstonCPTECH
Ben Thurston
4 years
SentinelOne : 🐿️ Is SquirrelWaffle the New Emotet? Learn how SquirreWaffle is infecting devices through malspam with changing file name patterns and unique payloads. - by @NJay_x00 . #malspam #emotet #SquirrelWaffle #malware #infosec.
Tweet card summary image
sentinelone.com
Learn about how SquirrelWaffle works, Infect devices through malspam & shares code with other attack frameworks. How to protect against SquirrelWaffle?
0
0
0
@BThurstonCPTECH
Ben Thurston
4 years
We're just a few days away from #SnowflakeSnowday! . Here's what to expect at the event:
0
0
0
@BThurstonCPTECH
Ben Thurston
4 years
We're just a few days away from #SnowflakeSnowday! . Here's what to expect at the event:
0
0
0
@BThurstonCPTECH
Ben Thurston
4 years
SentinelOne : 🧠 What is Behavioral AI and how does it work? Why is this approach replacing old EPP and EDR solutions? Learn all about it here:. . #cybersecurity #infosec #epp #edr #BehavioralAI #AI.
Tweet card summary image
sentinelone.com
What is Behavioral AI and how does it work? What makes it superior to the old EPP and EDR solutions in protecting the enterprise from today's threats?
0
0
0
@BThurstonCPTECH
Ben Thurston
4 years
SentinelOne : 🤕 Re-used or weak passwords, Legacy #AV, and delayed patching. Click below to learn seven more pitfalls that will destroy your #cybersecurity efforts. #Infosec #edr.
Tweet card summary image
sentinelone.com
Are your security efforts being undermined by these bad practices? Make sure you have the basics down and reduce your attack surface dramatically!
0
2
3
@BThurstonCPTECH
Ben Thurston
4 years
SentinelOne : 💵 No industry has been spared by ransomware, and cyber insurance is now a must-have. As insurers tighten their guidelines, make sure you know what to expect. By Barnaby Page. #cyberinsurance #cybersecurity #ransomware #insurance #info….
Tweet card summary image
sentinelone.com
Learn about cyber insurance, its benefits, coverage options, and how it protects your business from cyber threats. A comprehensive guide to cyber insurance.
0
0
0
@BThurstonCPTECH
Ben Thurston
4 years
RT @TDataScience: "Building a decay function in SQL is not trivial, but fun," says @felipehoffa, who explains and compares a couple of different approaches.
0
0
1
@BThurstonCPTECH
Ben Thurston
4 years
SentinelOne : RT @milad_aslaner: We at @SentinelOne continue to hire across all the disciplines and all geographies don't matter if you live in the United States, Europe, the Middle East, Africa, or the Asia Pacific!. #infosecjobs #careers #career #jobalert.
0
0
0
@BThurstonCPTECH
Ben Thurston
4 years
SentinelOne : 0️⃣Zero Trust Security - never trust, always verify. With this approach, organizations can reduce their open #attacksurface and adopt security capabilities beyond traditional defenses. Download the new #ZeroTrust Security Model white paper…
Tweet media one
0
0
0
@BThurstonCPTECH
Ben Thurston
4 years
SentinelOne : 😈 Unbreakable encryption, a data leak site, and threats of DDoS attacks, #Avaddon has all the tricks of a modern #RaaS. By Jim Walter. #ransomware #cybersecurity #infosec #DDoS.
0
0
1
@BThurstonCPTECH
Ben Thurston
4 years
SentinelOne : 📦 With attackers exploiting misconfigured Docker servers and the difficulty of keeping on top of container workloads, how can you protect your cloud assets? . . #cloud #cybersecurity #security #cloudsecurity #kubernetes #docker #doki.
Tweet card summary image
sentinelone.com
With attackers exploiting misconfigured Docker servers and the difficulty of keeping on top of container workloads, how can you protect your cloud assets?
0
3
4