Ann Johnson(@ajohnsocyber) 's Twitter Profileg
Ann Johnson

@ajohnsocyber

CVP - @Microsoft BoD @securewithhuman & @nable & @seattlehumane. Host #AfternoonCyberTea Podcast. Tweets are Just Me. RT just RT

ID:4860187219

calendar_today04-02-2016 18:33:07

49,6K Tweets

17,7K Followers

1,9K Following

Ann Johnson(@ajohnsocyber) 's Twitter Profile Photo

Secure by Design is not just a good practice, but a necessity in cybersecurity. It helps protects systems, data, and users from cyber threats, while improving performance and usability. Comcast Chief Information Security and Product Privacy Officer Noopur Davis joined me this

account_circle
CyberWire Daily, by N2K(@thecyberwire) 's Twitter Profile Photo

On @MsftSecurity's w/host Ann Johnson, Ann explores 'AI: The Promise and Potential Peril.' Ann has “Not With a Bug, But With a Sticker,” co-authors Ram Shankar Siva Kumar Ram Shankar Siva Kumar & Dr. Hyrum Anderson Hyrum Anderson join her to examine AI. hubs.li/Q0249pt40

account_circle
Ann Johnson(@ajohnsocyber) 's Twitter Profile Photo

“By all means move at a glacial pace, you know how that thrills me.”

“Your AI is powered by ghost workers.”

“Tis a sign, me mateys!”

These funny one liners and movie quotes double as book excerpt titles for today’s Afternoon Cyber Tea guests and authors of, “Not with a Bug,

account_circle
Ann Johnson(@ajohnsocyber) 's Twitter Profile Photo

Brooks Robinson’s 16 Golden Gloves are the most for any position player in MLB history. He dominated AL third base from 1960-75. RIP GOAT.

account_circle
CyberWire Daily, by N2K(@thecyberwire) 's Twitter Profile Photo

: platforms hit. The UK hunts forward. Mr. Security Answer Person John Pescatore shares thoughts in Cisco acquiring Splunk. Ann Johnson from the podcast interviews Deb Cupp sharing a lesson in leadership.
hubs.li/Q023tjJg0

account_circle
Ann Johnson(@ajohnsocyber) 's Twitter Profile Photo

“Team is everything,” says this week’s Afternoon Cyber Tea guest, President of Microsoft Americas Deb Cupp. Though Deb and I were a couple thousand miles away when recording, this one felt like two old friends sitting down over a cup(p) of, well…tea. She and I discuss the

account_circle
Microsoft Threat Intelligence(@MsftSecIntel) 's Twitter Profile Photo

Beginning July 2023, Storm-0324, a financially motivated threat actor known to gain access to networks and then hand off access to other actors, was observed distributing payloads by sending phishing lures thru Microsoft Teams chats. Get TTPs, mitigation: msft.it/60189d8Wi

account_circle
Ann Johnson(@ajohnsocyber) 's Twitter Profile Photo

On this – I agree fully. The energy and enthusiasm of today’s youth is nothing short of amazing, & I know that the cyber defenders of tomorrow will do great things! Hear this & more from Jenny Radcliffe in the latest episode of Afternoon Cyber Tea.

lnkd.in/gyZUsT7R

On this – I agree fully. The energy and enthusiasm of today’s youth is nothing short of amazing, & I know that the cyber defenders of tomorrow will do great things! Hear this & more from Jenny Radcliffe in the latest episode of Afternoon Cyber Tea. lnkd.in/gyZUsT7R
account_circle
Ann Johnson(@ajohnsocyber) 's Twitter Profile Photo

Every year I struggle with what to say. Just never forget those who went to work & never came home, the first responders who rushed into burning infernos & never came out, those who simply boarded a plane and did not survive. Lives lost. Lives destroyed.

account_circle
Microsoft Threat Intelligence(@MsftSecIntel) 's Twitter Profile Photo

We’re releasing a second version of our threat matrix for storage services, a structured tool that can help identify and analyze potential security threats on data stored in cloud storage services. Learn about the new attack techniques in the matrix: msft.it/60119ZQd9

account_circle
Ann Johnson(@ajohnsocyber) 's Twitter Profile Photo

Is social engineering an art? Science? Both?

Jenny Radcliffe - The People Hacker 🎤🎧🧠 discusses this and more on today’s episode of Afternoon Cyber Tea. Jenny is an expert social engineer putting human psychology to the test in her role as, “The People Hacker.” She uses

account_circle
CyberWire Daily, by N2K(@thecyberwire) 's Twitter Profile Photo

This week @MsftSecurity's w/Ann Johnson: 'Cybercrime: A Multi-Billion-Dollar Industry.' Ann & guest Michael Daniel (@CyAlliancePrez) of Cyber Threat Alliance tackle sophistication of hackers, , & global impact.
hubs.li/Q01_QLSn0

account_circle
Ann Johnson(@ajohnsocyber) 's Twitter Profile Photo

Cybercrime enterprises rake in money from their victims, and they have evolved from small time actors into big businesses with CEOs, CFOs, and enterprise structures. On today’s episode of Afternoon Cyber Tea, President and CEO of Cyber Threat Alliance J. Michael Daniel joins me to talk

account_circle
Ann Johnson(@ajohnsocyber) 's Twitter Profile Photo

Today on the Afternoon Cyber Tea season seven premiere, Executive Vice President of Microsoft Security Charlie Bell joins me to chat about:

🏃 The importance of rapid problem solving in cybersecurity
🖥️⚙️ How AI is enabling defense at machine speed
⚽ Why the entire

Today on the Afternoon Cyber Tea season seven premiere, Executive Vice President of Microsoft Security Charlie Bell joins me to chat about: 🏃 The importance of rapid problem solving in cybersecurity 🖥️⚙️ How AI is enabling defense at machine speed ⚽ Why the entire
account_circle