Social media behemoth Twitter hires Peiter Zatko! That’s the big news making waves this week in the cybersecurity circles. Zatko, who is better known as ‘Mudge,’ has been roped in as the security chief by Twitter to further beef-up its cybersecurity architecture. Zatko, aka ‘Mudge‘ is considered one of the world’s top hackers and has held top research positions at Google, Defense Advanced Research and Projects Agency, and Stripe.
In his new role, Zatko will evaluate and make necessary policy changes around Twitter’s cybersecurity, physical security, and platform integrity. Zatko will directly report to Jack Dorsey, the CEO of Twitter. A couple of months back, Twitter also appointed Rinki Sethi, an ex-IBM executive, as its new Chief Information Security Officer (CISO). This position had been vacant since December 2019. (See: Twitter hires Rinki Sethi as CISO to keep hackers at bay)
Twitter’s new appointments are part of its targeted efforts to enhance its cybersecurity infrastructure and prevent unauthorized access to its systems. The company has been facing severe criticism in the recent past because of its vulnerable IT systems
In July this year, Twitter witnessed a massive cybersecurity breach in its systems that resulted in many high-profile accounts getting hacked and created a massive furor in the digital world.
The infamous hacking incident, also known as the bitcoin hack, involved the widespread hack of several high-profile verified Twitter accounts, including ex-US President Barack Obama, Microsoft co-founder Bill Gates and Amazon CEO Jeff Bezos. The cybercriminals gained unauthorized access to the administrative controls of Twitter and hacked the accounts of famous personalities with millions of followers, and offered forged bitcoin deals.
The COVID-19 pandemic outbreak has forced businesses to enable full remote work environment and has opened the floodgates of security breaches. Threat actors and cyber-criminals are increasingly looking at opportunities to take advantage of cybersecurity loopholes in an organization to gain access and use it for personal gains (See: Top enterprise cybersecurity trends of 2020).
To mitigate the cybersecurity threats, security chiefs across organizations are expected to take a massive overhaul route to enable the best identity and access software and policies that could timely prohibit any unauthorized access.