Bores (@security_bore) 's Twitter Profile
Bores

@security_bore

Bores helps organisations to design and build effective, appropriate security programmes tailored to their specific business needs and strengths.

ID: 1229037110725873666

linkhttps://bores.com calendar_today16-02-2020 13:38:21

94 Tweet

95 Takipçi

91 Takip Edilen

Bores (@security_bore) 's Twitter Profile Photo

We're running a contest, with a fantastic prize. No cost to entry, just need to come up with a scenario you'd like to see run as a tabletop exercise. linkedin.com/feed/update/ur…

BSides Lancashire (@bsideslanc) 's Twitter Profile Photo

📢 Speaker Announcement We have the Technical Debt Collector James Bore Director of Bores Group Ltd presenting in our Innovation Village with his talk "An Introduction to Information Theory for Information Security " Talk times and Agenda TBA very soon

📢 Speaker Announcement

We have the Technical Debt Collector <a href="/Coffee_Fueled/">James Bore</a>  Director of Bores Group Ltd presenting in our Innovation Village with his talk "An Introduction to Information Theory for Information Security "

Talk times and Agenda TBA very soon
Scott McGready 🐿🏴󠁧󠁢󠁳󠁣󠁴󠁿 (@scottmcgready) 's Twitter Profile Photo

Nice to hear James Bore on BBC Radio Scotland this morning talking about the electoral commission breach and not taking the “OH MY GOD ALL OUR DATA IS PWNED” approach. Also props, I barely function at that time. 6:49am on catch up, listen here 👇 bbc.co.uk/sounds/play/li…

Bores (@security_bore) 's Twitter Profile Photo

Two generations (so far), and 35 years to the day that Bores was originally started by Chris Bore and Sarah - from a cupboard in the master bedroom with a desk, a computer, and a landline phone. Still running, so we must be doing something right.

Two generations (so far), and 35 years to the day that Bores was originally started by <a href="/chris_bore/">Chris Bore</a> and Sarah - from a cupboard in the master bedroom with a desk, a computer, and a landline phone.

Still running, so we must be doing something right.
James Bore (@coffee_fueled) 's Twitter Profile Photo

This is your sporadic reminder that if you aren't doing scenario testing for DR, BC, IR, and crisis management (not exhaustive list), you should be. And if you're not sure how to do it really, really well, you can get in touch any time.

This is your sporadic reminder that if you aren't doing scenario testing for DR, BC, IR, and crisis management (not exhaustive list), you should be.

And if you're not sure how to do it really, really well, you can get in touch any time.
Bores (@security_bore) 's Twitter Profile Photo

One of our Directors, James, talking about the opportunities and risks of AI, and the morally hazardous nature of its use.

Bores (@security_bore) 's Twitter Profile Photo

Medical technology is part of our hstoryi, from security and safety to helping design and build new diagnostic devices. facebook.com/C5News/posts/p…

James Bore (@coffee_fueled) 's Twitter Profile Photo

A few days before final numbers are sent for first printing. It'll become a valuable family heirloom! But seriously, it's a great book, really accessible, covering a huge range of topics. Pre-order a copy for yourself and another four for family. ;) bores.co/book

James Bore (@coffee_fueled) 's Twitter Profile Photo

It was shaping up to be a good Sunday, then I saw this advert (company details scrubbed). Targeted at small businesses, of course, because they're unlikely to have the resources to critically evaluate this nonsense. This is just one example in the quagmire of cyber security and

It was shaping up to be a good Sunday, then I saw this advert (company details scrubbed).

Targeted at small businesses, of course, because they're unlikely to have the resources to critically evaluate this nonsense.

This is just one example in the quagmire of cyber security and
Macrium Software (@macrium) 's Twitter Profile Photo

As the #Wannacry anniversary approaches, join us for our webinar 'How to Protect Your Backups from #Ransomware'. Gain insights from guest speaker James Bore, cyber security expert, author and MD of Cyber Security Consultancy Bores. Sign up here 👉🏿 eu1.hubs.ly/H090x220

As the #Wannacry anniversary approaches, join us for our webinar 'How to Protect Your Backups from #Ransomware'. Gain insights from guest speaker James Bore, cyber security expert, author and MD of Cyber Security Consultancy <a href="/security_bore/">Bores</a>. Sign up here 👉🏿 eu1.hubs.ly/H090x220
James Bore (@coffee_fueled) 's Twitter Profile Photo

We're looking at the deepfake problem wrong. Lots of chatter about tools to detect deepfaked content, and seemingly no focus on dealing with the source of the problem. linkedin.com/pulse/deepfake… via LinkedIn

James Bore (@coffee_fueled) 's Twitter Profile Photo

Bore's 10 Step Guide to Preventing YubiKey Cloning: 1. Don't hand over your YubiKey to anyone walking around with power monitoring equipment to plug it into. 2. Relax. I do worry about the world security researchers live in some times. Has the vuln got a logo yet?