Steve Kinder

3.5K posts

Steve Kinder banner
Steve Kinder

Steve Kinder

@StephenKinder

GPFS Engineering - IBM Storage - I own my tweets for which my employer, IBM, does not endorse. He/Him

Poughkeepsie, NY Katılım Temmuz 2009
865 Takip Edilen558 Takipçiler
Steven Dickens
Steven Dickens@StevenDickens3·
Great game to play at parties or here in the comments. Pick a song from a band or artist, and the winner is the biggest gap between their most popular song and their second most. @Spotify is the platform. For example: The La's - "There She Goes" 405,491,183 streams and their second most popular is "Feelin" with only 10,199,173 Any better than ~395m spread?
English
1
0
0
117
Steven Dickens
Steven Dickens@StevenDickens3·
Announcing The Launch Of HyperFRAME Research I’m thrilled to formally introduce HyperFRAME Research, a new venture designed to bring fresh perspectives and innovative approaches to the technology analyst space. For decades, large firms have shaped the analyst landscape, providing IT vendors with market insights and strategic guidance. However, the industry is evolving. Independent and boutique firms are emerging as key players, driven by their ability to deliver focused expertise, faster responsiveness, and solutions tailored to address gaps often overlooked by legacy firms. The demand for real-time, actionable insights that empower agile decision-making has never been more urgent or pressing. In parallel, traditional subscription models and paywalls are creating challenges. They can restrict access to critical information, especially for smaller organizations, while contributing to widespread "subscription fatigue." This shift is pushing organizations toward alternative models that prioritize accessibility without compromising quality. Another transformation is the convergence of communication channels across PR, AR, Influencer Relations, and Investor Relations. Platforms like X (formerly Twitter) now host direct updates from CEOs, blurring traditional boundaries and accelerating the flow of information. The need for a flexible, digital-first approach has become clear. Why HyperFRAME Research? HyperFRAME Research is built to address these challenges. Our mission is to provide frictionless, data-driven insights that are nuanced, timely, and actionable. We aim to support today’s fast-paced industry with intelligence that empowers informed decisions without unnecessary barriers. Next Steps - We are eager to connect and collaborate as we embark on this journey. Analyst Relations Professionals: Reach out via ARchitect or DM me to schedule briefings and explore partnership opportunities. Reporters: For quotes and insights, feel free to connect via DMs on X or LinkedIn. Visit our website: hyperframeresearch.com Follow us on X: @hyperframe_res This is just the beginning. Exciting times ahead! Also, check back in the new year for our new podcast, can't say too, much but I have got a very interested co-host lined up.
English
5
1
9
460
Steve Kinder
Steve Kinder@StephenKinder·
@theRab Sorry for your loss Ryan. I had a Morkie, Cooper, that looked somewhat like Banjo, which I lost in the fall this past year. Heart breaking.
English
1
0
1
28
Ryan A Boyles
Ryan A Boyles@theRab·
Yesterday, a beloved family member crossed the rainbow bridge. Miracles never cease, an awe inspiring rainbow appeared in the sky this evening where there were no rain clouds before. We see you Banjo! Run & play w/ Lucy. Banjo was 77 dog years old. He was a good boy. 💔 🌈
Ryan A Boyles tweet mediaRyan A Boyles tweet mediaRyan A Boyles tweet mediaRyan A Boyles tweet media
English
2
0
3
267
Steve Kinder
Steve Kinder@StephenKinder·
@astro_alexandra Cool. Could this have been leftover from the moon's creation, ejected when Theia creamed into proto-Earth?
English
1
0
4
250
Steve Kinder
Steve Kinder@StephenKinder·
@snehalantani I love this thought, Snehal. People are always the weak link; assuming they have fallen (or will always fall) for a phishing attack makes a ton of sense. Having software, processes, and methodologies that do not presume perfect human responses seems obvious now that you say it.
English
0
0
2
54
Snehal Antani
Snehal Antani@snehalantani·
I've been rethinking our approach to phishing defense lately, shifting from a focus on training & awareness to an "Assume Click" mindset... Every day, it becomes easier for attackers to craft convincing and targeted phishing attacks. Moreover, no matter how much we invest in training and awareness, some percentage of the company will click on a link. So we're on an unsustainable trajectory. "Assume Click", like "assume breach", just assumes employees will open every email and click every link. The burden shifts from educating the workforce to isolating the blast radius. So an "Assume Click" framework could be: 1. Blast Radius Reduction Goal: Determine the blast radius for each IAM Role within the organization. Often you'll be surprised at how the credentials of an "intern" could be used by attackers to become a Domain Admin. - Methodically reduce the blast radius for each IAM role - Methodically reduce the permissions for each user, shifting from permissive by default to least-privileged - Create a specific workstream focused on continuously reviewing and reducing the number of admin accounts and password reuse across those accounts 2. Isolating the compromise Goal: Prevent the attacker from gaining access to sensitive data and systems - Rollout phishing-resistant MFA using hardware tokens (e.g. Yubikeys) to make it difficult for attackers to actually utilize compromised credentials - Quickly isolate compromised endpoints, with a workstream focused on measuring and improving the reaction time for this process, with a special focus on the browser and end-user device - Focus on SOAR scripts that quickly invalidate credentials and isolate networks & systems Finally... Train like you fight. Build muscle memory from the end-user to the SOC on how to detect and respond to a user who has clicked on a malicious link I'm still thinking through this, but these are the areas I've been focused on building out. #phishing #infosec #CIO #CISO #cybersecurity @Horizon3ai
English
3
2
13
1.8K
🎸 Rock History 🎸
🎸 Rock History 🎸@historyrock_·
Metallica performing "Master Of Puppets" one week ago in Munich. This is not a performance, it is a statement. Rain, thunder, 60 years old… Nothing can stop Metallica. #Metallica
English
456
5.2K
28.4K
2.5M
Steve Kinder
Steve Kinder@StephenKinder·
@snehalantani Yes, agree with your thinking. Likely, most business interactions will be AI to AI, and they will learn a short-hand notation we won't even understand, say symbol exchange, and we'll really be in a situation where they will need to slow down to even talk to us meat sacks.
English
0
0
1
76
Snehal Antani
Snehal Antani@snehalantani·
[Controversial take on AI and security following RSA… ] After the walking the floor at RSA week, I think we’re going to experience 3 distinct phases of AI in cyber: Phase 1: The Great “Sameness”. Vendors will start sounding the same because marketing teams are rapidly adopting ChatGPT to update their content, websites, and messaging. This will make it nearly impossible for buyers to differentiate between what’s real vs vaporware Result: buyers will rely on champion-based selling where the opinion of trusted peers and partners will be paramount. Phase 2: Co-Pilots are the new “Dark Mode”. We’ll see an arms race for who can build the best chat interface into their product. The challenge: unless the vendor has a corpus of proprietary data, the chat interfaces will be trained on the same public information Phase 3: The Wreckoning. Nearly every product on the expo floor was designed for humans IN on ON the loop. [in the loop = human must do the work, like query log data On the loop = some supervised ML identifies anomalies for a human to investigate] But IMHO, the future of cyber warfare will be algorithms fighting algorthms with humans by exception. This means Humans must be OUT of the loop for nearly every decision and action, and that requires a fundamentally different Architecure and user experience. So the great reckoning: it will be very difficult for existing security vendors to rebuild their products from humans In/on the loop to “humans by exception”. That means for the first time in decades, the TAM for a security startup is… the entire market… Definitions: Humans In the Loop: Humans actively participate in the decision-making process of the AI system. They are directly involved in providing inputs, reviewing outputs, and making or approving decisions. Humans On the Loop: Humans monitor and oversee the AI system, which operates autonomously. They intervene only when necessary, such as in cases of malfunction or when the AI system encounters situations it cannot handle. Humans OUT of the loop: The AI system operates entirely autonomously without real-time human intervention or oversight. Humans may be involved in the initial programming and training of the system but are not part of its operational decision-making process. #cybersecurity #infosec #ai
English
1
1
5
565
Steve Kinder
Steve Kinder@StephenKinder·
@epc I did not know that; thank you for the PSA. I assume you mean black licorice.
English
1
0
0
20
Steve Kinder
Steve Kinder@StephenKinder·
@dims I lost one of these. The following week, hit with a lawnmower. (It had rained most of that week.) Had a small mark on the back case. Recharged, and as far I know, it still works - although the cell towers won't talk with these any longer.
English
1
0
1
35
Steve Kinder
Steve Kinder@StephenKinder·
@LouStagner Even with a rule change, you'd still occasionally get to leverage those skills - divots happen in the rough also.
English
0
0
0
12
Lou Stagner (Golf Stat Pro)
Lou Stagner (Golf Stat Pro)@LouStagner·
1. You can know how to hit from a divot. (i.e., be functional from a divot) 2. You can welcome the challenge of hitting from a divot. 3. You can think the rule on divots should be changed. You can be all three at the same time. They are not mutually exclusive.
English
66
7
328
73.4K
Steve Kinder
Steve Kinder@StephenKinder·
@WillStern_ I don't get the sealed tech bit. In the end, it's a box. I also recognize that people may feel the same about pieces of cardboard.
English
0
0
0
18
Will Stern
Will Stern@Will__Stern·
Sealed 1st Gen iPad for $2,276.25 I low key think someone got a steal - rare to see these at auction. But I also am way too into this sealed tech stuff…
Will Stern tweet media
English
4
0
13
1K
Lin Sun
Lin Sun@linsun_unc·
Stop by the poster session area to see @dims and me tonight during booth crawl! #KubeConEU
Lin Sun tweet media
English
1
2
43
2.1K