Search results
  1. People View all

  2. Jul 5

    To help you with your security I'm giving away a Nano Ledger to one lucky winner! 😁 Just Follow & Retweet to Enter - Will announce winner on Saturday 7th 12:00 UTC And remember - Keep your coins safe and cold! 💀

  3. President Muhammadu Buhari in Borno State, attends the 2018 Nigerian Army Day Celebration in Monguno.

  4. Women’s economic empowerment is a critical tool for their access to leadership & decision-making positions. I encourage them to take part in all , , and processes that will sustain their communities. Read:

  5. 2 hours ago

    I'll be giving a talk about to some high schoolers and their teachers. I want to tell them about the amazing work being done by Women in Tech (and ). Who would you recommend I tell them about?

  6. 8 hours ago

    does anyone know of any work on causal modeling of security incidents (e.g., bayesian models of what caused the incident)? pointers requested, please :)

    Show this thread
  7. So called forces, or better known as and forces, interrogate and torture a civilian. , not or .

  8. Jul 5

    President Muhammadu Buhari is currently in a meeting with a delegation from the Christian Association of Nigeria (CAN) from 19 Northern States and FCT Abuja led by Rev. Dr. Yakubu Pam, the meeting is holding at the Council Chambers of the State House, Abuja. .

  9. Jul 4
  10. Jul 3
  11. 7 hours ago
  12. 7 hours ago

    Violent episodes involving groups in in 2017. Under-reported outside of Africa (as usual).

  13. Jul 4
  14. Jul 5

    Please share this work and training opportunity with anyone who lives in Royal Borough of Kensington & Chelsea, City of Westminster, Hammersmith & Fulham or Brent in London 🇬🇧 Thank you 🤗

  15. Jul 4

    “Black Box has worked for my family for almost 30 years protecting our home & businesses. They are true professionals and I have complete confidence in their service which is testament to the longevity of our relationship.” Jonathan Smith

  16. Jul 4
  17. 17 hours ago

    The clocks on the network nodes maintain the same exact time, within 1 sec of each other, thus preventing a 'time gap' attack vector.

  18. Just had a very good meeting with my great friend Ambassador Fatima Khamis Al Mazrouie from . We discussed common goals and priorities including and the terrible situation in . 🇺🇸🇦🇪

  19. 12 hours ago

    Here are some useful tips to privacy-proof your desk at work

  20. Jul 4

    Validation of Red Hat's stance on security. "Open source library vulnerabilities increased by 53.8% in 2016, while Red Hat Linux vulnerabilities have decreased."

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.