Maryb
323 posts

Maryb
@MaryCybSec
Cloud Infra Security | Cybersecurity | CyberGirl | Azure specialist
Nigeria Katılım Mart 2020
214 Takip Edilen134 Takipçiler

analytics, & security. API Gateways best practices:
-Use HTTPS Communication
-Leverage Serverless Functions
-Use Centralized Authentication Server
-Limit Requests
-Implement Monitoring and Analytics
-Implement API-Ied Connectivity
-Manage Deprecated APIs
@HackingAPIWDami
English

@commando_skiipz I do give them name similar to the VM name and then add key at the end
English

Please how do you guys manage ssh keys on a Mac?
I’ve had to configure several keys while deploying infrastructures but I find myself forgetting the key names months later. And getting locked out of the servers.
YouTube videos are not helping.
Is there like a reliable and trusted ssh key manager out there for Mac?
English

@glovoapp_ng Hello @glovoapp_ng
I tried ordering food on your app yesterday, paid with bank transfer option, transfer successful and got receipt from paystack, but your app returned payment verification failed. I've sent emails 3 times now without your response, kindly refund my money asap.
English

What are you doing? AI has SOLVED Cybersecurity already. This is a FAKE hiring page created by the nay-sayers.
Do not get into Cybersecurity, it's OVER.
playboi.eth@adeolRxxxx
Claude would replace security researchers. But Anthropic hiring page:
English

@sankofa360 @grok is it safe to use milk tin to make moin moin, please?
English

Yesterday I saw a post of a lady that made moimoi. I thought i bookmarked it but couldn't find it.
Here's the thing: It's 2026 and we all have unlimited access to information.
Why are we deliberately harming ourselves?
Why are you guys still cooking or making MoiMoi with plastic bags? Some of you even microwave your food on plastic plates.
Don't you know that heat causes plastics to break down, leaching toxic chemicals like BPA and phthalates, along with microplastics into your food?
The consequence: Hormonal imbalances, reproductive issues, cancer, and metabolic disruptions, etc.
Simple solution: Do what your ancestors did. Wrap your moimoi in cocoyam or banana leaves and cook.

English

Since I'm focusing on security aspect, these are the security essentials that are helpful:
- Secure (HTTPS only)
- HttpOnly (block JS access)
- SameSite (prevent CSRF)
Pro tip: Don't store passwords or payment info in cookies.
#APISec #CyberSecurity #HAWD @HackingAPIWDami
English

Let's talk about web API protocols and standards.
The API standard you choose matters. REST works for most cases, but GraphQL eliminates over-fetching, WebSockets enable real-time experiences, and gRPC handles massive scale.
#ApiSec @HackingAPIWDami
English
Maryb retweetledi
Maryb retweetledi

I got awarded a scholarship to attend the 2026 Women in CyberSecurity (WiCyS) Conference taking place in Washington, DC.🇺🇸
I’m even happier because the women I provided guidance to also received the scholarship award. 🥳
Elizabeth Ekedoro@Lizettle_
Want to clinch the scholarship to attend the Women in Cybersecurity (WiCyS) annual conference in Washington DC 🇺🇸, and struggling with answering the scholarship essays? I have good news for you! 📌In this video you’ll learn: - A breakdown of the essay questions. - Tips on how to craft strong, authentic responses. NB: Scholarships can cover conference fees, travel reimbursement, feeding, and accommodation. Watch the full video here: youtu.be/S25fAo3vwm4 #WiCyS, #WiCySConference, #WiCySConferenceScholarship
English
Maryb retweetledi

This is your chance to get published in the 2026 Winter Issue of AI Cyber Magazine
There are just 2 openings left.
We want articles in the following categories:
OP-ed: Written to spark debate, introduce fresh viewpoints, and explore provocative ideas related to AI in cybersecurity.
How-To/Best Practice: Written to provide specific, practical, actionable guidance for cybersecurity engineers and analysts looking to implement AI-based solutions or improve existing processes.
Thought Leadership: Articles in this category present deeper research-based insights, strategic perspectives, or specialized analyses from industry experts, security analysts, researchers, and legal professionals.
You are the right contributor for us if ;
1. You are an experienced cybersecurity/legal/tech professional applying AI, implementing AI projects (with a security lens or to solve security challenges) or guardrails in your day-to-day paid work.
2. You have a knack for sharing your knowledge and learned lessons in an empowering way.
If I just described you, kindly send an email to editors[@]aicybermagazine.com to indicate interest in becoming a contributor. Include the topic you want to write about and include a short description (not more than 3 sentences) of what the article will cover.

English



