Ann Johnson (@ajohnsocyber) 's Twitter Profile
Ann Johnson

@ajohnsocyber

CVP - @Microsoft BoD @securewithhuman & @nable & @seattlehumane. Host #AfternoonCyberTea Podcast. Tweets are Just Me. RT just RT

ID: 4860187219

calendar_today04-02-2016 18:33:07

49,49K Tweet

16,16K Followers

1,1K Following

Ram Shankar Siva Kumar (@ram_ssk) 's Twitter Profile Photo

Lily Hay Newman (WIRED) wrote about the nuances of AI Red Team and the incredibly diverse and talented team that I call home. Liner notes ๐Ÿงต wired.com/story/microsofโ€ฆ

Ann Johnson (@ajohnsocyber) 's Twitter Profile Photo

Today on the Afternoon Cyber Tea season seven premiere, Executive Vice President of Microsoft Security Charlie Bell joins me to chat about: ๐Ÿƒ The importance of rapid problem solving in cybersecurity ๐Ÿ–ฅ๏ธโš™๏ธ How AI is enabling defense at machine speed โšฝ Why the entire

Today on the Afternoon Cyber Tea season seven premiere, Executive Vice President of Microsoft Security Charlie Bell joins me to chat about:

๐Ÿƒ The importance of rapid problem solving in cybersecurity
๐Ÿ–ฅ๏ธโš™๏ธ How AI is enabling defense at machine speed
โšฝ Why the entire
Ann Johnson (@ajohnsocyber) 's Twitter Profile Photo

Cybercrime enterprises rake in money from their victims, and they have evolved from small time actors into big businesses with CEOs, CFOs, and enterprise structures. On todayโ€™s episode of Afternoon Cyber Tea, President and CEO of A. A J. Michael Daniel joins me to talk

CyberWire Daily, by N2K (@thecyberwire) 's Twitter Profile Photo

This week @MsftSecurity's #AfternoonCyberTea w/Ann Johnson: "Cybercrime: A Multi-Billion-Dollar Industry." Ann & guest Michael Daniel (J. Michael Daniel) of A. A tackle sophistication of hackers, #persistentthreats, & #ransomware global impact. hubs.li/Q01_QLSn0

Ann Johnson (@ajohnsocyber) 's Twitter Profile Photo

Is social engineering an art? Science? Both? Jenny Radcliffe - The People Hacker ๐ŸŽค๐ŸŽง๐Ÿง  discusses this and more on todayโ€™s episode of Afternoon Cyber Tea. Jenny is an expert social engineer putting human psychology to the test in her role as, โ€œThe People Hacker.โ€ She uses

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Weโ€™re releasing a second version of our threat matrix for storage services, a structured tool that can help identify and analyze potential security threats on data stored in cloud storage services. Learn about the new attack techniques in the matrix: msft.it/60119ZQd9

Ann Johnson (@ajohnsocyber) 's Twitter Profile Photo

Every year I struggle with what to say. Just never forget those who went to work & never came home, the first responders who rushed into burning infernos & never came out, those who simply boarded a plane and did not survive. Lives lost. Lives destroyed.

Ann Johnson (@ajohnsocyber) 's Twitter Profile Photo

On this โ€“ I agree fully. The energy and enthusiasm of todayโ€™s youth is nothing short of amazing, & I know that the cyber defenders of tomorrow will do great things! Hear this & more from Jenny Radcliffe in the latest episode of Afternoon Cyber Tea. lnkd.in/gyZUsT7R

On this โ€“ I agree fully. The energy and enthusiasm of todayโ€™s youth is nothing short of amazing, & I know that the cyber defenders of tomorrow will do great things! Hear this & more from Jenny Radcliffe in the latest episode of Afternoon Cyber Tea.

lnkd.in/gyZUsT7R
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Beginning July 2023, Storm-0324, a financially motivated threat actor known to gain access to networks and then hand off access to other actors, was observed distributing payloads by sending phishing lures thru Microsoft Teams chats. Get TTPs, mitigation: msft.it/60189d8Wi

Ann Johnson (@ajohnsocyber) 's Twitter Profile Photo

โ€œTeam is everything,โ€ says this weekโ€™s Afternoon Cyber Tea guest, President of Microsoft Americas Deb Cupp. Though Deb and I were a couple thousand miles away when recording, this one felt like two old friends sitting down over a cup(p) of, wellโ€ฆtea. She and I discuss the

CyberWire Daily, by N2K (@thecyberwire) 's Twitter Profile Photo

#CWDaily: #DeFi platforms hit. The UK hunts forward. Mr. Security Answer Person John Pescatore shares thoughts in Cisco acquiring Splunk. Ann Johnson from the #AfternoonCyberTea podcast interviews Deb Cupp sharing a lesson in leadership. hubs.li/Q023tjJg0

Ann Johnson (@ajohnsocyber) 's Twitter Profile Photo

Brooks Robinsonโ€™s 16 Golden Gloves are the most for any position player in MLB history. He dominated AL third base from 1960-75. RIP GOAT.

Ann Johnson (@ajohnsocyber) 's Twitter Profile Photo

โ€œBy all means move at a glacial pace, you know how that thrills me.โ€ โ€œYour AI is powered by ghost workers.โ€ โ€œTis a sign, me mateys!โ€ These funny one liners and movie quotes double as book excerpt titles for todayโ€™s Afternoon Cyber Tea guests and authors of, โ€œNot with a Bug,

CyberWire Daily, by N2K (@thecyberwire) 's Twitter Profile Photo

On @MsftSecurity's #AfternoonCyberTea w/host Ann Johnson, Ann explores "AI: The Promise and Potential Peril." Ann has โ€œNot With a Bug, But With a Sticker,โ€ co-authors Ram Shankar Siva Kumar Ram Shankar Siva Kumar & Dr. Hyrum Anderson Hyrum Anderson join her to examine AI. hubs.li/Q0249pt40

Ann Johnson (@ajohnsocyber) 's Twitter Profile Photo

Secure by Design is not just a good practice, but a necessity in cybersecurity. It helps protects systems, data, and users from cyber threats, while improving performance and usability. Comcast Chief Information Security and Product Privacy Officer Noopur Davis joined me this