CyberDefAca Profile Banner
Cyber Defense Academy Profile
Cyber Defense Academy

@CyberDefAca

Followers
371
Following
962
Media
168
Statuses
540

Official X page of Cyber Defense Academy

World
Joined July 2023
Don't wanna be here? Send us removal request.
@CyberDefAca
Cyber Defense Academy
15 days
New video Alert πŸš¨πŸ”” Watch the scariest cyber threats in 2026 https://t.co/mWCVzoimpX
0
0
0
@CyberDefAca
Cyber Defense Academy
15 days
He’s a lua dev πŸ˜‚
@_devJNS
JNS
17 days
not a programmer..
0
0
0
@CyberDefAca
Cyber Defense Academy
15 days
Stop investing solely in higher walls. Start building a sharper, faster incident response team. Your assurance lies in your ability to survive the attack you didn't prevent. #Hacking
0
0
0
@CyberDefAca
Cyber Defense Academy
15 days
Shift your focus to critical metrics: β†’ Mean Time to Detect (MTTD) β†’ Mean Time to Respond (MTTR) How fast you find and contain a breach is what truly defines your security posture. #SOC
1
0
0
@CyberDefAca
Cyber Defense Academy
15 days
Why prevention inevitably fails: β€’ Humans make mistakes β€’ Zero-day exploits exist β€’ Attackers innovate evasion techniques Perfection is an impossible standard. Resilience is the real goal. #InfoSec
1
0
0
@CyberDefAca
Cyber Defense Academy
15 days
The era of the "impenetrable" system is over. Assurance no longer comes from prevention alone, but from assuming breach and excelling at detection and response. #CyberSecurity
1
0
2
@CyberDefAca
Cyber Defense Academy
15 days
New video Alert πŸš¨πŸ”” Watch the scariest cyber threats in 2026 https://t.co/ZfRRxIEE3p
0
1
2
@CyberDefAca
Cyber Defense Academy
22 days
Keep it up. Cybersecurity to the world!!!
@Oluwagbote47356
Mix
25 days
MY DHCP project I would normally take time to explain, but I want to appreciate the people today. God, my parents, @EhistheGreat @ireteeh @NetworkQueenX, my bro @Dstixx05 , @Mx8797 @Omowumi1811 @akintunero @adaezeonuorah2 @KoredeSec You have all in one way helped me.
0
0
3
@CyberDefAca
Cyber Defense Academy
30 days
Especially functions that took hours to write
@dev_maims
Coder girl πŸ‘©β€πŸ’»
1 month
0
0
0
@CyberDefAca
Cyber Defense Academy
2 months
Here are entry level roles as a Cyber security
0
0
0
@CyberDefAca
Cyber Defense Academy
2 months
0
1
1
@CyberDefAca
Cyber Defense Academy
2 months
0
0
0
@CyberDefAca
Cyber Defense Academy
2 months
Cyber Security to the world 🌎
0
0
0
@CyberDefAca
Cyber Defense Academy
2 months
The 2013 Target breach stole 40M credit cards. The shocking part? Hackers didn't attack Target directly. They came in through a small HVAC vendor. This is the textbook example of supply chain risk. A thread. πŸ‘‡ #CaseStudySunday #SupplyChainRisk #CyberSecurity
0
0
0
@lingodotdev
Lingo.dev
2 months
The coding experience be like πŸ˜‚
48
125
2K
@SecurityTrybe
Security Trybe
2 months
One of your servers has gone offline and you walk in to find this. What are you doing first?
252
44
544
@CyberDefAca
Cyber Defense Academy
2 months
For all the security pros, IT admins, and CISOs out there: Where do you see the biggest challenge in implementing application whitelisting in a large company? Is it the initial setup? Maintaining the list for thousands of endpoints? Dealing with developer and user pushback?
0
0
0
@CyberDefAca
Cyber Defense Academy
2 months
This power comes with a operational cost. Whitelisting requires meticulous management. Every new piece of software, every update, even every minor tool needs to be reviewed and added to the "approved" list. It's a battle between ultimate security and business agility. #ITAdmin
1
0
0
@CyberDefAca
Cyber Defense Academy
2 months
Here’s how it works as a ultimate kill-switch: - Blocks Unknown Malware: Zero-day ransomware? It's not on the list. Blocked. - Stops Script-Based Attacks: Malicious PowerShell scripts, macros, and .bat files? Denied. - Prevents Unauthorized Tools: Hackers can't download their
1
0
0
@CyberDefAca
Cyber Defense Academy
2 months
What if you could build a bouncer for your computers that only lets in VIPs? That's Application Whitelisting. Instead of blocking known bad software (blacklisting), it only allows pre-approved, trusted programs to run. It's one of the most powerful defenses against unknown
1
0
0