Beth Maundrill (@gunshipgirl) 's Twitter Profile
Beth Maundrill

@gunshipgirl

Editor at @InfosecurityMag 👩‍💻
B2B journalist/editor for over a decade, started off in defence and now covering cybersecurity. DMs are open.

ID: 2396018102

calendar_today18-03-2014 10:52:23

10,10K Tweet

4,4K Followers

1,1K Following

Beth Maundrill (@gunshipgirl) 's Twitter Profile Photo

Ahead of Data Privacy Week I am writing an article on how consumers can "take control" of their data. Looking for comment from data privacy experts on key concerns and actionable advice. DM me if you're have something to contribute. #journorequest

Infosecurity Europe (@infosecurity) 's Twitter Profile Photo

DORA is officially here: For financial entities, compliance with the EU’s Digital Operational Resilience Act (DORA) is non-negotiable. Learn how to stay proactively compliant. 👉 Read the full blog by Beth Maundrill here: bit.ly/3Cst2Vo

DORA is officially here: For financial entities, compliance with the EU’s Digital Operational Resilience Act (DORA) is non-negotiable. Learn how to stay proactively compliant.

👉 Read the full blog by <a href="/GunshipGirl/">Beth Maundrill</a> here: bit.ly/3Cst2Vo
Beth Maundrill (@gunshipgirl) 's Twitter Profile Photo

🎉This is BRAND NEW from Infosecurity Magazine for 2025. We've curated an agenda which focuses on some of the hot button issues CISOs face today, including: ▪️Personal liability ▪️Talking with the Board ▪️Investing in AI for cybersecurity I hope you can join us 👇

Kevin Poireault (@kpoireault) 's Twitter Profile Photo

💥 Major law enforcement operation against 8Base and Phobos 💥 Europol has confirmed the 8Base ransomware data leak site was seized and key figures behind Phobos and 8Base ransomware arrested in an international cybercrime crackdown.

💥 Major law enforcement operation against 8Base and Phobos 💥  

<a href="/Europol/">Europol</a>  has confirmed the 8Base ransomware data leak site was seized and  key figures behind Phobos and 8Base ransomware arrested in an international cybercrime crackdown.
Kevin Poireault (@kpoireault) 's Twitter Profile Photo

NEW - Chinese hackers are actively targeting suppliers of manufacturers in “sensitive” domains in the US and across the globe 🇨🇳🏭 Check Point Software plans to release a full report on the campaign in the next few weeks. 🔗 Read my article to learn more: infosecurity-magazine.com/news/new-chine…

NEW - Chinese hackers are actively targeting suppliers of manufacturers in “sensitive” domains in the US and across the globe 🇨🇳🏭

<a href="/CheckPointSW/">Check Point Software</a> plans to release a full report on the campaign in the next few weeks.

🔗 Read my article to learn more: infosecurity-magazine.com/news/new-chine…
Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

While businesses are leveraging AI to strengthen security, threat actors are using it to enhance attacks. Join our keynote session with Pluralsight & our Editor Beth Maundrill to discover more about the specific security controls and considerations needed to protect AI

While businesses are leveraging AI to strengthen security, threat actors are using it to enhance attacks.  

Join our keynote session with <a href="/pluralsight/">Pluralsight</a> &amp; our Editor <a href="/GunshipGirl/">Beth Maundrill</a> to discover more about the specific security controls and considerations needed to protect AI
Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

At tomorrow's Infosecurity Magazine Virtual Summit session with James Coker, attendees will learn how to build strong executive relationships, take a resilience-based approach to security, and use data-driven insights to showcase the value of security investments. Register

At tomorrow's Infosecurity Magazine Virtual Summit session with <a href="/ReporterCoker/">James Coker</a>, attendees will learn how to build strong executive relationships, take a resilience-based approach to security, and use data-driven insights to showcase the value of security investments.  

Register
Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

AI, machine learning, and automation are changing the game, offering new ways to strengthen defenses. At the same time, effective risk management is crucial for maintaining visibility across the organization and mitigating emerging threats. Join tomorrow's Virtual Summit

AI, machine learning, and automation are changing the game, offering new ways to strengthen defenses. 

At the same time, effective risk management is crucial for maintaining visibility across the organization and mitigating emerging threats.  

Join tomorrow's Virtual Summit
Infosecurity Europe (@infosecurity) 's Twitter Profile Photo

.Infosecurity Magazine returns with the Women in Cybersecurity event at #Infosec2025! This dedicated event brings together women from across cybersecurity and is a valuable opportunity to grow your network and connect with a supportive community. Learn more: spkl.io/6016fI5Er

.<a href="/InfosecurityMag/">Infosecurity Magazine</a> returns with the Women in Cybersecurity event at #Infosec2025!

This dedicated event brings together women from across cybersecurity and is a valuable opportunity to grow your network and connect with a supportive community.

Learn more: spkl.io/6016fI5Er
Beth Maundrill (@gunshipgirl) 's Twitter Profile Photo

M&S has said its now stopping all orders via its website and app as part of its cyber incident response - three days after it first notified investors of the incident. Anyone able to comment on why this action may have been taken as part of an incident response strat?

NCSC UK (@ncsc) 's Twitter Profile Photo

A new Cyber Series podcast episode out now! Hear a transparent conversation with guests Nicola Hudson, Partner at Brunswick Group & Beth Maundrill, Editor Infosecurity Magazine to understand the dos and don’ts of crisis comms in cyber incidents. Listen now⬇️ creators.spotify.com/pod/show/natio…

A new Cyber Series podcast episode out now! Hear a transparent conversation with guests Nicola Hudson, Partner at <a href="/BrunswickGroup/">Brunswick Group</a> &amp; <a href="/GunshipGirl/">Beth Maundrill</a>, Editor <a href="/InfosecurityMag/">Infosecurity Magazine</a> to understand the dos and don’ts of crisis comms in cyber incidents. Listen now⬇️
creators.spotify.com/pod/show/natio…