CloudyCISO Profile Banner
Cloudy with a chance of an attack Profile
Cloudy with a chance of an attack

@CloudyCISO

Followers
329
Following
0
Media
59
Statuses
660

All things AI, Security, Stocks and Investments

Some mental state
Joined August 2019
Don't wanna be here? Send us removal request.
@techNmak
Tech with Mak
1 month
[ Microservices - Authentication Mechanisms ] Give it a read 👇 Pro tip => These Authentication Mechanisms/Types are not limited just to microservices. [1.] 𝐀𝐏𝐈 𝐊𝐞𝐲𝐬 ◾ Simple, unique identifiers assigned to each client or service. ◾ Sent as a header or query parameter
16
124
684
@systemdesignone
Neo Kim
1 month
Load Balancer vs Reverse Proxy vs API Gateway (explained in 2 mins or less):
29
266
2K
@cyber_razz
Abdulkadir | Cybersecurity
1 month
Ever wondered how HTTPS actually keeps your data safe? Here’s what happens behind the scenes every time you visit a secure website 1️⃣ TCP Handshake – Your device and the server agree to communicate. 2️⃣ Certificate Check – The server proves its identity with a trusted
1
104
638
@NikkiSiapno
Nikki Siapno
1 month
Things Every Developer Should Know: JSON Web Token (JWT). JWTs are one of the most widely used methods for API authentication, providing a secure, stateless and scalable way to verify clients. Here’s a simple-to-understand breakdown of how it works (step by step): 𝟭)
6
82
497
@alexxubyte
Alex Xu
3 months
JWT vs PASETO: The Two Players of Token-Based Authentication
7
105
543
@sahnlam
Sahn Lam
4 months
SSH Under the Hood
5
266
2K
@alexxubyte
Alex Xu
4 months
Session, Cookie, JWT, Token, SSO, and OAuth 2.0 Explained in One Diagram
11
230
2K
@devops_tech
Rakesh Jain
4 months
Load Balancer vs Reverse Proxy vs API Gateway A Thread 🧵
11
252
2K
@alexxubyte
Alex Xu
4 months
What happens when you type a URL into a browser?
11
154
974
@alexxubyte
Alex Xu
5 months
Reverse proxy vs. API gateway vs. load balancer
9
123
985
@alexxubyte
Alex Xu
5 months
Top 12 Tips for API Security
6
129
780
@clintgibler
Clint Gibler
6 months
During RSA week I had the pleasure of interviewing @philvenables (former Google Cloud & Goldman Sachs CISO) on effectively scaling security programs, how Google leverages AI for security, and more. We discussed: * The challenge of scaling security from artisanal to industrial *
1
5
16
@fr0gger_
Thomas Roccia 🤘
6 months
🤓 OpenAI recently published an interesting threat report about how threat actors are using generative AI. Here is a quick rundown: 👇 - Fake Jobs: IT workers using AI for deceptive hiring schemes. - China IO: “Sneer Review” creates fake reviews and posts. - Philippines IO:
4
22
61
@karpathy
Andrej Karpathy
6 months
RT to help Simon raise awareness of prompt injection attacks in LLMs. Feels a bit like the wild west of early computing, with computer viruses (now = malicious prompts hiding in web data/tools), and not well developed defenses (antivirus, or a lot more developed kernel/user
@simonw
Simon Willison
6 months
If you use "AI agents" (LLMs that call tools) you need to be aware of the Lethal Trifecta Any time you combine access to private data with exposure to untrusted content and the ability to externally communicate an attacker can trick the system into stealing your data!
100
535
3K
@simonw
Simon Willison
6 months
If you use "AI agents" (LLMs that call tools) you need to be aware of the Lethal Trifecta Any time you combine access to private data with exposure to untrusted content and the ability to externally communicate an attacker can trick the system into stealing your data!
87
542
2K
@SketechWorld
Sketech | Raw Dev Notes
6 months
Top API Security Practices for 2025🔥 Which one should we add next? - - - - - - - - - - - - - - 🔥@SketechWorld
2
6
40
@SketechWorld
Sketech | Raw Dev Notes
6 months
Proxy Types: Forward vs Reverse 🔥 No more mystery ------------- @SketechWorld
2
39
205
@socialwithaayan
Muhammad Ayan
6 months
Deleting your browser history doesn’t delete your actual history. Google still knows everything. If you truly want to wipe your digital footprint, here’s how to do it properly:
59
735
4K
@CloudyCISO
Cloudy with a chance of an attack
6 months
0
0
0
@sahnlam
Sahn Lam
6 months
OAuth 2.0 Flows Visualized Note: The Implicit Flow is no longer recommended due to security vulnerabilities. Consider using the Authorization Code Flow with PKCE for enhanced security.
4
94
594