lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

65
active users

#sandbox

0 posts0 participants0 posts today

Monday news from ITSPmagazine 🙂 #happymonday!

Join Marc Manzano, Sean Martin, CISSP and me on this week SandboxAQ Webinar!

After an incredible conversation with Marc on the #RSAC floor in San Francisco — where Sean and I used every second of our time and still had more to explore — I knew the #Sandbox Story couldn’t stop there.

If you missed that on-location episode from #RSAC2025, catch it here:

👉 Security at the Edge of Change – A Brand Story with Marc Manzano from SandboxAQ

itspmagazine.com/their-stories

Now, we’re keeping the momentum going with a live ITSPmagazine webinar you don’t want to miss — and I won’t either. 🤘😬

🔐 How To Detect And Mitigate Non-Human Identity And Cryptographic Vulnerabilities | An ITSPmagazine Webinar with SandboxAQ

Join Marc, Sean, and me as we dig deeper into how SandboxAQ is tackling one of today’s most urgent security challenges.

Unmanaged cryptographic assets and non-human identities have left security teams blind to critical risks. These gaps have fueled vulnerabilities, breaches, compliance challenges, and operational drag across enterprise environments.

By attending, you’ll:

🔸 Gain visibility into cryptographic assets and non-human identities like API keys, certificates, and service accounts

🔸 See how #AQtiveGuard enables automated discovery, threat detection, and root cause analysis without disrupting workflows

🔸 Learn how to future-proof your security with Post-Quantum Cryptography readiness and AI-powered #SecOps

📌 Learn more:

👉 itspmagazine.com/itspmagazine-

📅 REGISTER NOW:

Can’t attend the live webinar? All registrants get exclusive access with a link to rewatch the recording.

👉 crowdcast.io/c/how-to-detect-a

Share the news and join us!

See you live on Thursday!

#infosec

#cybersecurity

#technology

#tech

#infosecurity

#AIsecurity

#postquantum

#cryptography

#identitymanagement

Chats on the road to #RSAC2025
All Aboard the Innovation Express: RSAC 2025 Is Rolling In Hot

🎙️✨This one’s a tradition—and we’re keeping it alive.

Every year, Sean Martin, CISSP and I hit the road for RSAC, and every year, we catch up with our friend Cecilia Murtagh Marinier, the force behind RSA Conference’s Innovation and Scholars programs. But this year? They’ve laid new tracks. Literally.

From the 20th anniversary of the Innovation #Sandbox (with $50M in real funding on the table) to #DARPA Defense Advanced Research Projects Agency (DARPA) #AI Cyber City train ride, from brand-new investor and entrepreneur sessions to immersive villages and quiet networking corners—it’s all there. And it’s bigger than ever.

Come along for the ride. 🎧

🧠 It’s cybersecurity innovation, with heart, humor, and human connection.

🎥 Watch the teaser video:
👉 youtu.be/lkNIZRQme1E

📺 Full video interview:
👉 youtu.be/59mW2XNz0CE

🎙️ Listen to the full podcast:
👉 eventcoveragepodcast.com/episo

📌 Meet RSAC in our coverage hub:
itspmagazine.com/rsac

🗓️ Get ready for April 28 – May 1, 2025
🚗 We’ll see you in San Francisco!

—Marco

On Location with Sean & Marco | ITSPmagazine

There is no reason why #sandbox #ttrpg campaigns cannot have long-running plots. A sandbox setting doesn't have to be frozen in amber, with areas and people only "coming to life" when the PCs interact with them.

For my, running a sandbox campaign means giving the players the freedom to decide _how_ they want to engage with overarching plots - including the villains or other important factions and NPCs. Do they seek a direct confrontation or prefer stealthy subterfuge? Do they ignore specific threats, play them against each other, or even seek to ally with them? That should be for the players to decide. And conversely, the NPCs should dynamically act and react to the actions of the player character, incorporating them into their own plans.

And this is what makes sandbox campaigns truly exciting to me as a GM. I am developing the villains and other factions and what their plans are - but I have no idea how all of this is going to play out in the campaign itself!

Replied in thread

@kde@floss.social @kde@lemmy.kde.social

Thx for the info, then it is like that.

Here is the goal proposal

phabricator.kde.org/T17370

Tbh, #bubblewrap would need to be fixed drastically to be as secure as the #Android #sandbox. And (I am not sure yet) I think even #Snaps are more secure (on #Ubuntu with #Apparmor patches) than #Flatpak with the current system.

As far as I understood, sandboxing needs to happen in #userspace, with tools like #fuse doing the work while being restricted by #MAC like #SELinux or Apparmor.

phabricator.kde.org⚓ T17370 Sandbox all the things!
Replied in thread

@kde@floss.social @kde@lemmy.kde.social

Can you tell us what happens on the "sandbox all the things" goal?

I think this is a pretty crucial step forward, even though #sandbox technologies (most often through user namespaces) are more problematic than I initially thought.

(Basically, user #namespaces open up #privesc dangers to the monolithic #kernel, which is incredible. #Android and #ChromeOS use #LXC, mounts and #SELinux for #sandboxing)