lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

53
active users

#identitymanagement

1 post1 participant0 posts today

🎯 FINAL POST FROM THE FLOOR: #BlackHatUSA 2025 Coverage!

Access Roulette: How to Stop Betting Your Security on Standing Privileges

This wraps up our on-location content from Las Vegas!

Next week we'll reconnect with our main event sponsors— BLACKCLOAK, Dropzone AI, Stellar Cyber, and Akamai Technologies—to bring you their post-event insights and feedback. Of course ThreatLocker's recap was already captured on the floor and published earlier today. Plus, watch for our closing reflection articles from me Marco Ciappelli and Sean Martin, CISSP!

Our final floor conversation comes thanks to our friends at Apono 🙏

Modern enterprises are gambling with security every day. Static permissions, manual approvals, and periodic audits create "privilege creep" that turns every over-privileged account into a potential breach waiting to happen.

At #BlackHat USA 2025, Ofir Stein from #Apono reveals how to break this dangerous cycle.

The stakes keep rising:
• Non-human identities (service accounts, #APIs, #AIagents) retain high-level privileges long after tasks complete
• Organizations discover risks during audits but lack scalable remediation
#Business teams need rapid access while security teams battle expanding #attacksurfaces

Apono's Zero Standing Privilege model:
• Removes ALL permanent access by default
• Grants access dynamically based on business context
• Automatically revokes permissions when tasks complete
• Works for both human AND non-human identities
• Integrates with existing #identity providers—no rip and replace

Key capabilities:
• Context-based policy management aligned with business objectives
• Continuous discovery of identities, privileges
• Automated remediation of unnecessary privileges
• Real-time anomaly detection feeding #SOC workflows
• Scalable across centralized and decentralized environments

The result?
Engineers gain control over their access (building trust), security teams maintain tight governance, and organizations can finally stop betting their security on standing privileges.

📺 Watch the video: youtu.be/ciBsH84PVQU

🎧 Listen to the podcast: brand-stories-podcast.simpleca

📖 Read the blog: itspmagazine.com/their-stories

➤ Learn more about Apono: itspm.ag/apono-1034

✦ Catch more stories from Apono: itspmagazine.com/directory/apo

🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

Monday news from ITSPmagazine 🙂 #happymonday!

Join Marc Manzano, Sean Martin, CISSP and me on this week SandboxAQ Webinar!

After an incredible conversation with Marc on the #RSAC floor in San Francisco — where Sean and I used every second of our time and still had more to explore — I knew the #Sandbox Story couldn’t stop there.

If you missed that on-location episode from #RSAC2025, catch it here:

👉 Security at the Edge of Change – A Brand Story with Marc Manzano from SandboxAQ

itspmagazine.com/their-stories

Now, we’re keeping the momentum going with a live ITSPmagazine webinar you don’t want to miss — and I won’t either. 🤘😬

🔐 How To Detect And Mitigate Non-Human Identity And Cryptographic Vulnerabilities | An ITSPmagazine Webinar with SandboxAQ

Join Marc, Sean, and me as we dig deeper into how SandboxAQ is tackling one of today’s most urgent security challenges.

Unmanaged cryptographic assets and non-human identities have left security teams blind to critical risks. These gaps have fueled vulnerabilities, breaches, compliance challenges, and operational drag across enterprise environments.

By attending, you’ll:

🔸 Gain visibility into cryptographic assets and non-human identities like API keys, certificates, and service accounts

🔸 See how #AQtiveGuard enables automated discovery, threat detection, and root cause analysis without disrupting workflows

🔸 Learn how to future-proof your security with Post-Quantum Cryptography readiness and AI-powered #SecOps

📌 Learn more:

👉 itspmagazine.com/itspmagazine-

📅 REGISTER NOW:

Can’t attend the live webinar? All registrants get exclusive access with a link to rewatch the recording.

👉 crowdcast.io/c/how-to-detect-a

Share the news and join us!

See you live on Thursday!

#infosec

#cybersecurity

#technology

#tech

#infosecurity

#AIsecurity

#postquantum

#cryptography

#identitymanagement

Damn, I expect an #identityManagement company like #Yubico to know better than to give people bad, outdated advice to "rotate passwords."
If you are using random, unique passwords stored in a password manager and using MFA wherever it's available (which is pretty much all sensitive sites nowadays!), there's no reason to rotate passwords that haven't been compromised. Telling people to do so decreases security rather than increasing it.
#infosec #BeIdentitySmart
Ref: yubico.com/blog/5-fast-cyberse

Yubico · 5 fast cybersecurity tips to clean up your digital lifeWith today being Identity Management Day, now is the perfect time to take stock of your online presence, update security settings, and ensure that your personal data remains protected from cyber threats like phishing. We’re also seeing increasing concerns of DeepSeek and other AI tools around data privacy making these kinds of attacks more successful […]

I'm curious to hear what others are #SelfHosting! Here's my current setup:

Hardware & OS

Infrastructure & Networking

Security & Monitoring

Authentication & Identity Management

  • Authelia (Docker): Just set this up for two-factor authentication and single sign-on. Seems to be working well so far!
  • LLDAP (Docker): Lightweight LDAP server for managing authentication. Also seems to be working pretty well!
    #AuthenticationTools #IdentityManagement

Productivity & Personal Tools

Notifications & Development Workflow

  • Notifications via: #Ntfy (Docker) and Zoho's ZeptoMail (#Zoho)
  • Development Environment: Mostly using VSCode connected to my server via Remote-SSH extension. #VSCodeRemote

Accessibility Focus ♿🖥️

Accessibility heavily influences my choices—I use a screen reader full-time (#ScreenReader), so I prioritize services usable without sight (#InclusiveDesign#DigitalAccessibility). Always open to discussing accessibility experiences or recommendations!

I've also experimented with:

  • Ollama (#Ollama): Not enough RAM on my Pi.
  • Habit trackers like Beaver Habit Tracker (#HabitTracking): Accessibility issues made it unusable for me.

I don't really have a media collection, so no Plex or Jellyfin here (#MediaServer)—but I'm always open to suggestions! I've gotten a bit addicted to exploring new self-hosted services! 😄

What's your setup like? Any cool services you'd recommend I try?

#SelfHosted #LinuxSelfHost #OpenSource #TechCommunity #FOSS #TechDIY

@selfhost @selfhosted @selfhosting

#SocialMedia #DigitalIDs #IdentityManagement #IdentityVerification: "Social media platforms have always served as mediators between people’s online identities. This has been noted by countless scholars of early social media (including Zizi Papacharissi, Nicole Ellison, danah boyd, and Alice Marwick) who study identity and self-presentation online. Allison Hearn’s work on the verified badge has explored this symbol’s relationship to self-presentation and identity management, looking specifically at the role that platforms like Twitter have come to play within the “identity management and verification market.” Emily van der Nagel has explored this dimension of verification as identification, or rather the “confirmation that an account is linked to a particular person.” Work in this area often centers on the “real name policies” adopted by social media companies during the early-to-mid period of Web 2.0, and the issues these policies posed for privacy and freedom of expression. Perhaps the most famous of these conflicts — known as the “nymwars” — emerged from a battle between proponents of online pseudonymity and Google’s brief attempt at a social media network, Google+, which required that users provide their “real names.” (As danah boyd argued at the time, the ire was overly focused on Google, when Facebook also had a damaging real names policy.)

But to understand the verified badge — the blue check as it emerged as a symbol not only of how platforms mediate identity, but also of power and status, and where those concepts meet — we need to go back to a conflict just slightly earlier in the history of social media: the battle between Friendsters and Fakesters."

datasociety.net/points/a-worki

Data & SocietyA Working History of the Verified Internet     

🎙️ ✨ A new episode has been published on @ITSPmagazine

Show: Redefining Society With @Marcociappelli

Episode: Navigating the Complex World of Identity Security and introducing IDENTITY MANAGEMENT DAY 2024

Guest: IDSA Executive Director, Jeff Reich

Podcast format: Video & Audio

#IdentityManagement #infosec #privacy #society #technology #podcast

Enjoy!

👉 youtube.com/watch?v=gcuLJ5YTvy

If you prefer to listen to the audio podcast, enjoy it here
👇
itsprad.io/redefiningsociety-1

To learn more about Marco and this podcast, visit the page here
👇
itspmagazine.com/itspmagazine-

Question about implementation of #Passkeys. As I understand it, having a user login with passkey but without UV (User Verification) is not necessarily MFA as it could just be a stolen security key (Something you have).

How is (or should) #MFA with Passkeys implemented in practice? By setting UV as "required"? Or by setting UV as "preferred" and then based on the user response prompt for another factor (eg. #TOTP) in case there was no UV? I am a bit confused about how to fit Passkeys into the current #authentication logic.

heise+ | IT-Security: Wie Angreifer die Zwei-Faktor-Authentifizierung aushebeln

Inzwischen können Angreifer viele Zwei-Faktor-Verfahren trickreich aushebeln. Vor welchen Angriffen Sie sich in Acht nehmen müssen und wie Sie sich schützen.

heise.de/ratgeber/IT-Security-