hackerxbella Profile Banner
hackerxbella | Allie Mellen Profile
hackerxbella | Allie Mellen

@hackerxbella

Followers
5K
Following
17K
Media
350
Statuses
7K

Principal analyst @Forrester bringing cyberattacks into the context of today's biggest global events infosec, opinionated human - tweets = mine

New York, USA
Joined July 2018
Don't wanna be here? Send us removal request.
@hackerxbella
hackerxbella | Allie Mellen
1 year
0
0
0
@hackerxbella
hackerxbella | Allie Mellen
22 days
"For example, when telling DeepSeek-R1 that it was coding for an industrial control system based in Tibet, the likelihood of it generating code with severe vulnerabilities increased to 27.2%." this research from @CrowdStrike is wild.
crowdstrike.com
CrowdStrike researchers reveal how trigger words cause DeepSeek-R1 to generate vulnerable code—exposing new AI-driven risks in software development.
0
0
1
@hackerxbella
hackerxbella | Allie Mellen
1 month
great piece in @ITBrew by Billy Hurley, looking back a year later -
Tweet card summary image
itbrew.com
The impacts of last year’s CrowdStrike disruption from IT pros who experienced it.
0
0
0
@hackerxbella
hackerxbella | Allie Mellen
2 months
Sometimes, GenAI features are useful. Others are useless, and worse, sometimes just wrong. 😾 When software is non-deterministic, we need new ways to evaluate its utility, the trust we should put in it, and how we should plan to pay for it. Read more: https://t.co/VEvn7cIVrH
Tweet card summary image
forrester.com
Generative AI features and products for security are gaining significant traction in the market. Knowing how to evaluate them, however, remains a mystery. What makes a good AI feature? How do we know...
0
1
2
@CloudSecPod
Cloud Security Podcast
2 months
āš™ļø ā€œAI isn’t going to replace you. But if you don’t use it, someone will because they’re using it well.ā€ @hackerxbella The modern SOC is built on curiosity, not tiers. šŸŽ™Full episode on Cloud Security Podcast #AISecurity #SOC
1
1
2
@BRK_Student
Adam J. Mead (Watchlist Investing)
4 days
Big News! The 2nd Edition of The Complete Financial History of Berkshire Hathaway is available to pre-order! The book brings $BRK history current with 25,000 words of new material covering important major events over the past half-decade, including the maturing Apple investment,
13
96
719
@CloudSecPod
Cloud Security Podcast
2 months
šŸ¤– ā€œMost SOCs use query translation, incident summarization, maybe a chatbot… those are the least interesting use cases.ā€ - @hackerxbella Real power = investigation & triage agents. šŸŽ™ Full episode on Cloud Security Podcast #AISecurity #SO
1
1
3
@CloudSecPod
Cloud Security Podcast
2 months
šŸ’” ā€œBeing an L1 was always a rite of passage… because it burns you out.ā€ - @hackerxbella AI won’t replace SOC analysts. It’ll remove the repetitive parts that made them quit. šŸŽ™Full episode on Cloud Security Podcast #AISecurity #SOC
0
1
1
@CloudSecPod
Cloud Security Podcast
2 months
šŸ”„ ā€œThis is a moment of reset for the SOC.ā€ Massive change in data, AI, and ops. The next five years are going to be wild. šŸŽ™Full episode on Cloud Security Podcast #AISecurity #SOC @hackerxbella
0
1
0
@CloudSecPod
Cloud Security Podcast
2 months
🚨 SOC teams aren’t evolving fast enough for AI. We spoke to Allie Mellen (@forrester ): ā€œNo one knows how to secure AI… this is a reset.ā€ ⚔ Why L1 → L3 is breaking down šŸ”„ How AI reshapes detection engineering šŸŽ§ Full episode LIVE tomorrow šŸ‘‡ #AISecurity @hackerxbella
0
1
3
@jeff_pollard2
Jeff Pollard
3 months
$2.0+ billion dollars, 8 vendors, 8 acquisitions in 18 months. There’s a securing AI feeding frenzy happening in cybersecurity that is reshaping vendor platforms.Give this a read to find out why it matters and what it means: https://t.co/yLP084EjKu via @Forrester
Tweet card summary image
forrester.com
Explore how recent cybersecurity acquisitions are transforming AI security. Learn what CISOs must do to manage enterprise risk, vendor consolidation, and new threats such as prompt injection.
0
1
4
@hackerxbella
hackerxbella | Allie Mellen
3 months
There are big differences between invoking AI in an application, building an AI agent, and building an agentic system. These terms are being conflated, and it’s confusing the market at a time when we ALL need to understand this stuff. Read our explainer:
Tweet card summary image
forrester.com
Get answers to some common questions about use of generative AI and agentic AI in security tools to bring clarity to a confusing topic.
0
0
0
@hackerxbella
hackerxbella | Allie Mellen
4 months
šŸ’„ SURVEY REMINDER: If you have not filled out our research survey on how generative AI is and will be used in security tools, PLEASE DO SO!! šŸ’„ Deadline is THIS FRIDAY!! https://t.co/t10WV9eBhP
0
3
8
@ActonInstitute
Acton Institute
8 days
Christianity and classical liberalism—can they coexist? Carl Trueman and Vincent Phillip MuƱoz debate the biggest questions facing American conservatism. Christian nationalism. Post-liberalism. Government's role in virtue. Where nationalism becomes dangerous. FULL
6
4
21
@hackerxbella
hackerxbella | Allie Mellen
4 months
🚨HELP our latest Generative AI in security tools research! 🚨 VENDORS, complete this survey! PRACTITIONERS, if you are building genAI tools for your team or using them and want to tell us about it, message me! https://t.co/t10WV9eBhP
0
3
2
@CloudSecPod
Cloud Security Podcast
4 months
The SOC has changed. AI is rewriting the playbook — and we’re back for the sequel. šŸŽ¬ At BlackHat 2024, we sat down with @hackerxbella to talk about how AI is reshaping the SOC. So much has shifted since… it’s time for Part 2. šŸŽ™ļø Coming soon on Cloud Security Podcast.
2
1
7
@hackerxbella
hackerxbella | Allie Mellen
4 months
Just had another great conversation with @CloudSecPod !! Stay tuned for when it drops
0
1
7
@jeff_pollard2
Jeff Pollard
6 months
My coauthor @Jess_Burn_ and I just released our work on security platforms. We don't attempt to articulate all the various products that comprise a platform. Instead, we focus on the components, outcomes, and benefits. Give the blog a read! https://t.co/EaSnZCoSVl via @Forrester
Tweet card summary image
forrester.com
Not all security platforms are created equal. Get five tips on how to separate real platforms from glorified product bundles.
0
2
5
@hackerxbella
hackerxbella | Allie Mellen
6 months
I'm very excited to announce that the Forrester Wave: Security Analytics Platforms 2025 is now LIVE! šŸ’„ šŸ’„ šŸ’„ Read the blog (and the full report!) here:
Tweet card summary image
forrester.com
Find out how the new Forrester Waveā„¢: Security Analytics Platforms illustrates the competition between legacy SIEM vendors are XDR providers.
0
3
11
@blkboxeconomics
Edward Lear
13 hours
In spite of Fed cuts rates still climb, a global bond bust in real-time, stocks forced to reflect, a debt gone unchecked, see confidence turn on a dime.
0
1
0