Infosec_EricG Profile Banner
Eric G Profile
Eric G

@Infosec_EricG

Followers
713
Following
2K
Media
2
Statuses
665

GTM Strategy - Advisor - Investor - Cybersecurity - AI - DevSecOps - Strategic Partnerships. Tweets are my own.

Austin, TX
Joined March 2010
Don't wanna be here? Send us removal request.
@Infosec_EricG
Eric G
4 years
@wdmorrisjr
David Morris
4 years
The fish rots from the head down. 16 toxic leadership behaviors that destroy trust, stop progress, and kill culture:
0
1
14
@Infosec_EricG
Eric G
3 years
Are you attending the #plugandplay Summit in Sunnyvale next week? Are you in the Southbay? Come meet up with Oz Wasserman and me to learn about collaboration security at the speed of business. We are not a #DLP. Reco is a Data… https://t.co/v3B3Js2KiS
Tweet card summary image
plugandplaytechcenter.com
Silicon Valley November Summit 2025
0
1
3
@Infosec_EricG
Eric G
4 years
Please join  https://t.co/Rw8BoQU2BR  at our #RSA Welcome Happy Hour Sunday night at the W hotel! We promise no sales presentations! Welcome Happy Hour Sunday June 5 6:30-9:30 pm Upstairs bar at the W hotel In addition to ha… https://t.co/3fEnfMkgqJ
lnkd.in
This link will take you to a page that’s not on LinkedIn
0
0
3
@Infosec_EricG
Eric G
4 years
In the Southbay? Join us this Thursday as  https://t.co/Rw8BoQU2BR  CEO, @snehalantani, will discuss why the "wartime" InfoSec mindset must shift to "train like you fight" and verify readiness. Gain some valuable insights from his ti… https://t.co/FVT1RfZxhq
lnkd.in
This link will take you to a page that’s not on LinkedIn
0
0
3
@Infosec_EricG
Eric G
4 years
https://t.co/Rw8BoRbE0r  sits at the intersection of vulnerability scanners, penetration testing services, and breach attack simulation tools. We deliver our product as a self-service cloud offering — no persistent agents, no consul… https://t.co/3XecD32b3V
Tweet card summary image
linkedin.com
Horizon3.ai sits at the intersection of vulnerability scanners, penetration testing services, and breach attack simulation tools. We deliver our product as a self-service cloud offering — no persis...
0
0
2
@Infosec_EricG
Eric G
4 years
Autonomous Pentesting as a Service #APTaaS gives you an attackers' perspective. #penetrationtesting #pentesting #redteam #purpleteam #cybersecurity #nodezero #fixwhatmatters
@Horizon3ai
Horizon3.ai
4 years
Did you know that with NodeZero you can assess your entire #network from the #attacker’s POV? NodeZero is at the forefront of #cybersecurity #technology, but how do you know that? Check it out and verify that it’s just as awesome as we promise. https://t.co/V4pioft29s
0
0
0
@AVindman
Alexander S. Vindman 🇺🇸
4 years
Please retweet this important message for widest distribution.
@Schwarzenegger
Arnold Schwarzenegger
4 years
I love the Russian people. That is why I have to tell you the truth. Please watch and share.
388
10K
20K
@Infosec_EricG
Eric G
4 years
@Horizon3ai
Horizon3.ai
4 years
A COO in the #IT industry recently gave NodeZero a 5 star rating on @Gartner_inc Peer Insights! They said our product was fully installed and operational within 15 minutes. That’s something we’re definitely #proud of! https://t.co/qo2T536hvY
0
1
3
@Infosec_EricG
Eric G
4 years
Less Stoltenberg I know the following is unexpected, but the below post is from our CEO regarding how the CISO position is rapidly changing given today's environment, I was eager to hear your thoughts on shifting from a "peacetime" CISO fighting criminal… https://t.co/TzLMLS7iwM
Tweet card summary image
linkedin.com
Less Stoltenberg I know the following is unexpected, but the below post is from our CEO regarding how the CISO position is rapidly changing given today's environment, I was eager to hear your...
0
0
0
@Infosec_EricG
Eric G
4 years
https://t.co/Rw8BoRbE0r Don't trust your security controls, verify them. Most of our customers went from 0-2 pentest a year to over 50, with some running over 30 a month every month. Read some real-life examples below and to learn more about NodeZero… https://t.co/hCz5v1QO7n
0
0
0
@Infosec_EricG
Eric G
4 years
“Hack with https://t.co/Rw8BoRbE0r” Tech Talk Who: https://t.co/Rw8BoRbE0r Attack team, led by Naveen Sunkavally Zach Hanley Monti Knode and Noah King When:   February 23rd at 1400 est.  Live #hacking session. Learn TTPs fr… https://t.co/0OAKxu7AUc
0
0
0
@Infosec_EricG
Eric G
4 years
https://t.co/Rw8BoRbE0r I have been here nearly 18 months, and this morning I was just as excited as my first day when I started. I can honestly say this is by far the best Team/Culture I've ever worked for. If you are a learn-it-all, and you want to… https://t.co/yMr7BjLtXZ
0
1
1
@Infosec_EricG
Eric G
4 years
The hardest part of your job as a security practitioner is deciding what NOT to fix, and vulnerability scanners lack context, which causes lots of noise. @Horizon3ai we cut out the noise and focus on Exploitable Vulnerabilities, mis-configs, and weak and default passwords.
@snehalantani
Snehal Antani
4 years
Building on my disdain for CVSS scores & #vulnerability scanners. #Security auditors & compliance-minded CISO's pressure organizations into fixing the "critical's" & "high's" from tools like @qualys or #Nessus, often at the sacrifice of fixing problems that are truly exploitable
0
0
0
@Infosec_EricG
Eric G
4 years
Another Log4shell #RCE POC. See below. With @Horizon3ai run an #autonomouspentest to FIND-FIX-VERIFY log4hsell #exploits as part of a Proof of Value. #log4j #log4jrce #remotecodeexecution #log4j2 #log4shell #log4shellexploits #pentest #penetrationtesting #cybersecurity
@Horizon3Attack
Horizon3 Attack Team
4 years
Another #log4shell #RCE POC. Apereo CAS 6.3 and 6.4 vuln in the X-Forwarded-For and username field. Typically deployed external facing to provide SSO. Rough @shodanhq query shows ~4.5K hosts. Apereo has released patches to address #log4j last month. #cybersecurity #BugBounty
0
0
0
@Infosec_EricG
Eric G
4 years
@Horizon3ai
Horizon3.ai
4 years
A variety of #security tools have come up recently to assist companies in remediating #Log4Shell. Most of the tools stop at the point of detecting. Read our newest @Horizon3Attack #redteam blog on how to exploit it like an attacker would. #log4j2 #NodeZero
0
1
1
@Infosec_EricG
Eric G
4 years
https://t.co/Rw8BoQU2BR Understanding #CredentialAttacks on how attackers don't need to "hack in", they can log in with valid credentials they've harvested. Some highlights: - 80% of hacking-related data breaches involve brute… https://t.co/uEKvDaSNm4
lnkd.in
This link will take you to a page that’s not on LinkedIn
0
2
0
@Infosec_EricG
Eric G
4 years
@Horizon3Attack
Horizon3 Attack Team
4 years
#VMware #vROps trivially vulnerable to RCE with #log4shell CVE-2021-44228 in the username field. #cybersecurity #BugBounty #log4j #log4jrce
0
1
0
@Infosec_EricG
Eric G
4 years
#APT ‘Aquatic Panda’ Targets Universities with #Log4Shell Exploit Tools “Aquatic Panda is a China-based [APT] with a dual mission of intelligence collection and industrial espionage,”  “Due to its ubiquitous use, many common in… https://t.co/5zRC5KAvsy
lnkd.in
This link will take you to a page that’s not on LinkedIn
0
0
0