Chris

717 posts

Chris

Chris

@chrishackademic

Turn AI chaos into secure, scalable workflows. SaaS & fintech | 6-week Secure AI Deployment. Research → real-world execution. Free Secure AI Strategy Call 👇

San Diego Katılım Kasım 2008
543 Takip Edilen347 Takipçiler
Sabitlenmiş Tweet
Chris
Chris@chrishackademic·
AI is moving fast — but most companies are deploying it recklessly. • No guardrails • No architecture • No compliance alignment • Shadow AI everywhere I built a 6-Week Secure AI Deployment Framework that turns chaos into scalable, protected workflows. If you want AI deployment without the risk: 👉 Book Your Free Secure AI Strategy Call tidycal.com/105nnnm/30-min…
English
0
0
1
62
Chris
Chris@chrishackademic·
@ADP Someone is trying to scam me by claiming I owe you money. How can I report that to your security team?
English
1
0
0
16
Chris
Chris@chrishackademic·
@EconTalker Wow! Congrats and well done! I've been listening since the beginning. Excellent guest and topic for the anniversary episode.
English
0
0
1
26
Russ Roberts
Russ Roberts@EconTalker·
The 20th anniversary episode of EconTalk lands in a few hours.
English
46
23
527
32.3K
Chris
Chris@chrishackademic·
Big thanks to @Starlink and @elonmusk. Our ISP went down due to a cut cable. We were able to go to the local Best Buy and pick up a Starlink mini kit and get back on the internet pronto. Now we have a nice solid reliable Internet backup.
English
0
0
0
28
Chris
Chris@chrishackademic·
@FrontierCorp Do you have an estimated time for restoral of services in the 92596 zip code area? Internet has been down all day.
English
1
0
0
47
Mayank Vora
Mayank Vora@aiwithmayank·
Perplexity AI > McKinsey You don't need McKinsey anymore. Just use Perplexity AI to automate market research, competitive analysis, and strategy design for free. Here’s the mega prompt you can steal: (Comment "Automate" and I'll DM you 300+ mega prompts for automation)
Mayank Vora tweet media
English
618
136
1.1K
116.4K
Chris
Chris@chrishackademic·
Cal Newport's latest podcast confirms what I've been seeing in cybersecurity training: IQ scores are declining for the first time since WWII. The culprit? We stopped reading AND smartphones killed our attention spans. Full thoughts here: linkedin.com/feed/update/ur…
English
3
0
3
60
Marcus J. Carey
Marcus J. Carey@marcusjcarey·
Unpopular opinion: The IT and cybersecurity certification market is saturated and many of them have totally lost their value.
English
179
139
2.6K
140.8K
Chris
Chris@chrishackademic·
🚀 "Zeek acts as a 'network telescope,' passively observing all network communications and creating detailed records." The difference between junior and senior analysts? Methodology. Systematic investigation beats intuition every time. Learn the approach that separates security professionals - link in bio. #Zeek #NetworkSecurity #InfoSec #SOC
English
0
0
2
28
Chris
Chris@chrishackademic·
🎯 From Vern Paxson's 1998 research paper to today's industry standard. Zeek transforms raw network traffic into structured, searchable evidence. 25+ years of proven methodology. Thousands of SOCs worldwide. One systematic approach to network investigation. Ready to level up your analysis skills? Start with our 7-day Zeek Kickstart - link in bio. #Zeek #CyberSecurity #NetworkSecurity #SOC
English
0
0
1
27
Chris
Chris@chrishackademic·
🔎 dns.log reveals intent before the connection: query = what they asked for 🧠 answers = where it's going 📍 uid = trace it back 🧵 ⚠️ Suspicious domain + instant connect = likely malware. 🧠 Master this & more in 7-day Zeek Kickstart — link in bio 🔖 #Zeek #NetworkSecurity #IncidentResponse #ThreatHunting
English
0
0
0
22
Chris
Chris@chrishackademic·
conn.log fields every analyst needs: ts = timeline ⏰ Definition: Timestamp of when the connection started; essential for timeline reconstruction in investigations. uid = connection thread 🧵 Definition: Unique ID for the connection; links related events across multiple Zeek logs like http.log, dns.log, etc. orig_h / resp_h = who talked 💬 Definition: IP addresses of the originator and responder; identifies who initiated and who replied in the conversation. service = what they used 🌐 Definition: Detected application-layer protocol (e.g., HTTP, SSH); reveals the nature of the connection. conn_state = did it work? ✅❌ Definition: Outcome of the connection (e.g., successful, failed, reset); useful for spotting anomalies or failures. duration = how long 🕒 Definition: Total length of the connection in seconds; helps distinguish short scans from long sessions.
English
1
0
0
17
Chris
Chris@chrishackademic·
🔍 Learn network investigation with these two critical Zeek logs: conn.log = WHO talked to WHOM, WHEN, and HOW MUCH data dns.log = WHERE they intended to go and WHAT they were looking for Thread: Reading logs like a detective 👇
English
1
0
0
26