Ed Bellman

2.6K posts

Ed Bellman banner
Ed Bellman

Ed Bellman

@EdBellman

Husband, father, geek, AFOL, former IT guy, M365 & Power Platform. Principle Consultant Power Apps at @P3Adaptive / Opinions are own / Disagreement ≠ hate

Ohio شامل ہوئے Ocak 2010
381 فالونگ127 فالوورز
Ed Bellman ری ٹویٹ کیا
Cincinnati Reds
Cincinnati Reds@Reds·
Cincinnati Reds tweet media
ZXX
286
906
6.6K
444.2K
Ed Bellman
Ed Bellman@EdBellman·
The @Bengals should sign Ja’Marr to a new record deal on Monday, and then on Tuesday announce restructured deals for Burrow and Ja’Marr and a new deal for Higgins to keep them all three together. And then on Wednesday an extension for Trey. See, that was easy…!
English
0
0
0
22
Overwatch
Overwatch@PlayOverwatch·
Classic Overwatch. Classy rewards. Enter for a chance to win an Overwatch Collector’s Edition and other prizes 🤩 Now - Nov 30: 🤝 Follow us ❤️ Like this post 💬 Comment your favorite Overwatch: Classic Hero with #Overwatch2Sweepstakes Official rules: blizz.ly/4i8BqsT
Overwatch tweet media
English
7K
1.6K
16.4K
813.5K
Ed Bellman ری ٹویٹ کیا
TPS
TPS@TotalProSports·
Nintendo prepped us for this.
TPS tweet media
English
666
10.8K
126.5K
6.4M
Ed Bellman ری ٹویٹ کیا
Paul Dehner Jr.
Paul Dehner Jr.@pauldehnerjr·
If you ever want to understand the margins of life in the NFL do a study of the Chiefs’ 9-0 versus the #Bengals’ 4-6.
English
94
186
3K
215K
Ed Bellman ری ٹویٹ کیا
ProFootballTalk
ProFootballTalk@ProFootballTalk·
Forget about sideline scowling. Joe Burrow needs to start getting in the faces of officials who blow calls, like Tom Brady used to do. Because it works. nbcsports.com/nfl/profootbal…
English
102
150
1.9K
215K
Ed Bellman ری ٹویٹ کیا
LASIK.com
LASIK.com@LASIKdotcom·
Better Vision. Better Calls. Yes, we’re still offering NFL refs free LASIK.
English
434
6.5K
58.3K
2.7M
Ed Bellman ری ٹویٹ کیا
Andrew Russell
Andrew Russell@Andrew_Russell7·
In their 3 wins the Bengals have built leads by throwing the football, but for some reason abandon that and try to "protect" their 4th quarter lead. 1st Q: 66% pass 2nd Q: 87% pass 3rd Q: 60% pass 4th Q: 28% pass You have to trust Burrow and his weapons to close it out.
English
32
73
1.2K
49.2K
Ed Bellman ری ٹویٹ کیا
nathan😾
nathan😾@nwhodey·
Burrow isn’t top 5 in MVP odds btw
nathan😾 tweet media
English
456
720
7.1K
427.7K
Ed Bellman ری ٹویٹ کیا
Donald J. Trump
Donald J. Trump@realDonaldTrump·
The GREAT Pete Rose just died. He was one of the most magnificent baseball players ever to play the game. He paid the price! Major League Baseball should have allowed him into the Hall of Fame many years ago. Do it now, before his funeral! DJT
English
5K
20K
220K
26.1M
Ed Bellman ری ٹویٹ کیا
Cincinnati Reds
Cincinnati Reds@Reds·
The Reds are heartbroken to learn of the passing of baseball legend Pete Rose.
Cincinnati Reds tweet media
English
850
5.5K
26.1K
1.3M
Ed Bellman ری ٹویٹ کیا
BlackRoomSec
BlackRoomSec@blackroomsec·
Please share this far and wide. As far and wide as you can. NIST Password Guidelines for 2024 are in the process of being updated. This is a HUGE pet-peeve of mine (when vendors in particular are still operating like its 2017 and keep changing passwords every 60 days, STOP DOING THIS, it's outdated and has been shown to put you MORE at risk than less -- NIST explains why it does in this document, meticulously outlining user behavior**) so I'm sharing this in the hopes all of you will pass it along to your bosses. The Special Publication series governing passwords is SP 800-63 "Digital Identity Guidelines". The 2024 version is 800-63-4. Here: pages.nist.gov/800-63-4/ The companion docs are also on that link. They are 800-63A, 800-63B and 800-63C. These are different documents for different scenarios in play at your org. The previous update was in2020. The changes in the 2020 version from the 2017 version were numerous but one of them was that the password verification method should NO LONGER require passwords be changed at specific intervals (i.e. every 60 days) but in the following circumstances instead: 1. After a breach/compromise 2. User request 2024 repeats this and adds a bunch more guidlines but here is a screenshot of page 13 of the new 800-63-4 (note the # 4 after it) which outlines how your systems should now and moving forward, be handling passwords. This goes for Active Directory, too. All your systems which have passwords should align with these guidelines provided there isn't another standard or framework you must adhere to which overrules this. Most frameworks, however, have moved away from arbitrary password resets and complexity rules. **We cybersec researchers and hackers use wordlists from breaches in a variety of different ways. Hackers use them in tooling to crack passwords whereas researchers use breach dumps to see the kinds of passwords users are creating and the psychology behind them. Using complexity rules gets you the user psychology of: Password1 Password2 and so on Use phrasing instead and allow for spaces, which is important. Humans type phrases with spaces. They also mention phish-resistant methods and most vendors are on-board with MS going to be turning off all Legacy Auth next month, across all free accounts and tenancies. I'm so excited for the new changes! Ok I'm off my soapbox. Share the love! Thank you!
BlackRoomSec tweet media
English
186
1.8K
5.5K
645.3K
Ed Bellman ری ٹویٹ کیا
Elon Musk
Elon Musk@elonmusk·
Elon Musk tweet media
ZXX
9.8K
85.5K
650.2K
45.7M