handmade.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
handmade.social is for all handmade artisans to create accounts for their Etsy and other handmade business shops.

Server stats:

35
active users

#iam

0 posts0 participants0 posts today
Worteks<p>Les mots de passe sont-ils morts ?<br>Quelle est la différence entre gestion des identités et gestion des accès ?<br>C'est quoi le 2FA, le MFA, le PasswordLess ?</p><p>🎙️ Les réponses à ces questions et bien plus, dans le nouvel épisode du podcast "Tout est sous CTRL" par Centreon !</p><p>🎧 Écoutez l'épisode maintenant sur votre plateforme préférée :<br><a href="https://open.spotify.com/show/24LgLR47tKMx1zN0Fg2bub" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">open.spotify.com/show/24LgLR47</span><span class="invisible">tKMx1zN0Fg2bub</span></a><br><a href="https://www.deezer.com/fr/show/1001329601" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">deezer.com/fr/show/1001329601</span><span class="invisible"></span></a><br><a href="https://podcasts.apple.com/us/podcast/tout-est-sous-ctrl/id1784998561" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">podcasts.apple.com/us/podcast/</span><span class="invisible">tout-est-sous-ctrl/id1784998561</span></a><br><a href="https://antennapod.org/deeplink/subscribe/?url=%68%74%74ps%3A%2F%2Fanchor.fm%2Fs%2Ffc0eaedc%2Fpodcast%2Frss&amp;title=Tout+est+sous+CTRL" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">antennapod.org/deeplink/subscr</span><span class="invisible">ibe/?url=%68%74%74ps%3A%2F%2Fanchor.fm%2Fs%2Ffc0eaedc%2Fpodcast%2Frss&amp;title=Tout+est+sous+CTRL</span></a><br><a href="https://www.youtube.com/watch?v=lBR8vA8NIuE" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=lBR8vA8NIuE</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a> <a href="https://mastodon.social/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a> <a href="https://mastodon.social/tags/MFA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MFA</span></a> <a href="https://mastodon.social/tags/IGA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IGA</span></a> <a href="https://mastodon.social/tags/LDAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LDAP</span></a> <a href="https://mastodon.social/tags/SSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSO</span></a></p>
Paul Sanders 😎<p>Fancy some typical <a href="https://infosec.exchange/tags/linkedin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linkedin</span></a> posts about <a href="https://infosec.exchange/tags/Yobah" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Yobah</span></a>? </p><p>It’ll be written to fit into the algorithm, but you might find some cool info or news. Most of my upcoming <a href="https://infosec.exchange/tags/blog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blog</span></a> posts on <a href="https://infosec.exchange/tags/iam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iam</span></a>, <a href="https://infosec.exchange/tags/zerotrust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zerotrust</span></a> and <a href="https://infosec.exchange/tags/entraID" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>entraID</span></a> will be posted here first.</p><p>Would love it if you could drop us a follow :)</p><p><a href="https://www.linkedin.com/company/the-yobah-network/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/company/the-yobah</span><span class="invisible">-network/</span></a></p>
Paul Sanders 😎<p>If you want to know more about <a href="https://infosec.exchange/tags/yobah" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>yobah</span></a>, then why not visit the website at <a href="https://yobah.co.uk" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">yobah.co.uk</span><span class="invisible"></span></a>?</p><p> <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> <a href="https://infosec.exchange/tags/strategy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>strategy</span></a> <a href="https://infosec.exchange/tags/architect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>architect</span></a> <a href="https://infosec.exchange/tags/iam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iam</span></a> <a href="https://infosec.exchange/tags/zerotrust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zerotrust</span></a> <a href="https://infosec.exchange/tags/infrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infrastructure</span></a> <a href="https://infosec.exchange/tags/sccm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sccm</span></a> <a href="https://infosec.exchange/tags/manchester" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>manchester</span></a> <a href="https://infosec.exchange/tags/uk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>uk</span></a> <a href="https://infosec.exchange/tags/Yobah" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Yobah</span></a> <a href="https://infosec.exchange/tags/consultancy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>consultancy</span></a></p>
Paul Sanders 😎<p>Think it’s time to update my <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> post. </p><p>Hi! </p><p>I’m a <a href="https://infosec.exchange/tags/strategy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>strategy</span></a> <a href="https://infosec.exchange/tags/architect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>architect</span></a> by trade, focusing mostly on <a href="https://infosec.exchange/tags/iam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iam</span></a> and <a href="https://infosec.exchange/tags/zerotrust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zerotrust</span></a> - albeit a long history in <a href="https://infosec.exchange/tags/infrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infrastructure</span></a> architecture. Cut my teeth as it were during the virtualisation revolution (I feel older than that 😂) </p><p>Prior to that, I did desktop builds using Norton ghost and then <a href="https://infosec.exchange/tags/sccm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sccm</span></a>.</p><p>I live in <a href="https://infosec.exchange/tags/manchester" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>manchester</span></a>, <a href="https://infosec.exchange/tags/uk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>uk</span></a> and started <a href="https://infosec.exchange/tags/Yobah" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Yobah</span></a> - a boutique <a href="https://infosec.exchange/tags/consultancy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>consultancy</span></a> working on strategy transformation.</p><p>Feel free to reach out and say hi!</p>
LDAP Tool Box Project<p>LTB packages for OpenLDAP 2.5.19 and 2.6.9 are available!</p><p>These packages provide the new versions released by the OpenLDAP core team and some add-ons from the LDAP Tool Box project</p><p>More information on <a href="https://projects.ow2.org/view/ldaptoolbox/ltb-openldap-2-5-19-and-2-6-9-packages-released/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">projects.ow2.org/view/ldaptool</span><span class="invisible">box/ltb-openldap-2-5-19-and-2-6-9-packages-released/</span></a></p><p><a href="https://floss.social/tags/LDAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LDAP</span></a> <a href="https://floss.social/tags/OpenLDAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenLDAP</span></a> <a href="https://floss.social/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a> <a href="https://floss.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://floss.social/tags/FreeSoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeSoftware</span></a></p>
Jack Poller<p><a href="https://siliconangle.com/2024/11/20/ai-meets-cybersecurity-twine-launches-12m-funding-digital-cyber-employees/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">siliconangle.com/2024/11/20/ai</span><span class="invisible">-meets-cybersecurity-twine-launches-12m-funding-digital-cyber-employees/</span></a></p><p><a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IdentityManagement</span></a> <a href="https://infosec.exchange/tags/Automation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Automation</span></a> <a href="https://infosec.exchange/tags/TechInnovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechInnovation</span></a> <a href="https://infosec.exchange/tags/AIinCyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIinCyber</span></a> <a href="https://infosec.exchange/tags/DigitalTransformation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalTransformation</span></a> <a href="https://infosec.exchange/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a> <a href="https://infosec.exchange/tags/IdentitySecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IdentitySecurity</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/Funding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Funding</span></a><br>5/5</p>
Jack Poller<p><a href="https://venturebeat.com/security/zitadel-targets-developers-with-open-source-identity-management-platform/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">venturebeat.com/security/zitad</span><span class="invisible">el-targets-developers-with-open-source-identity-management-platform/</span></a></p><p><a href="https://infosec.exchange/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IdentityManagement</span></a> <a href="https://infosec.exchange/tags/CIAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CIAM</span></a> <a href="https://infosec.exchange/tags/CustomerIdentityManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CustomerIdentityManagement</span></a> <a href="https://infosec.exchange/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://infosec.exchange/tags/PasswordlessAuthentication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PasswordlessAuthentication</span></a> <a href="https://infosec.exchange/tags/DeveloperTools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeveloperTools</span></a> <a href="https://infosec.exchange/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a> <a href="https://infosec.exchange/tags/CloudNative" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudNative</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/Innovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Innovation</span></a> <a href="https://infosec.exchange/tags/Funding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Funding</span></a><br>5/5</p>
yawnbox :rebel:<p>I've written a new blog post (9000 words) taking a moderately deep dive into "Threat Modeling YubiKeys and Passkeys"</p><p><a href="https://yawnbox.is/blog/threat-modeling-yubikeys-and-passkeys/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">yawnbox.is/blog/threat-modelin</span><span class="invisible">g-yubikeys-and-passkeys/</span></a></p><p>I greatly welcome feedback as I want to make sure I'm not misrepresenting anything. I want to make it better if it can be improved. I'm happy to be wrong, just please provide details and links!</p><p>also, i need a job! if you like my work, maybe you know of something where i'd be a good fit.</p><p><a href="https://disobey.net/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://disobey.net/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://disobey.net/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a> <a href="https://disobey.net/tags/FIDO2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FIDO2</span></a> <a href="https://disobey.net/tags/WebAuthn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebAuthn</span></a> <a href="https://disobey.net/tags/YubiKey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YubiKey</span></a> <a href="https://disobey.net/tags/YubiKeys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YubiKeys</span></a> <a href="https://disobey.net/tags/passkey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passkey</span></a> <a href="https://disobey.net/tags/passkeys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passkeys</span></a> <a href="https://disobey.net/tags/GetFediHired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GetFediHired</span></a></p>
Tedi Heriyanto<p>Starter guide to understanding Okta: <a href="https://www.elastic.co/security-labs/starter-guide-to-understanding-okta" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">elastic.co/security-labs/start</span><span class="invisible">er-guide-to-understanding-okta</span></a></p><p><a href="https://infosec.exchange/tags/okta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>okta</span></a> <a href="https://infosec.exchange/tags/iam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iam</span></a></p>
HN Security<p>Our security researchers @cod_rse@twitter.com and <span class="h-card" translate="no"><a href="https://infosec.exchange/@inode" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>inode</span></a></span> conducted a security assessment on <a href="https://infosec.exchange/tags/Keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keycloak</span></a>, identifying significant vulnerabilities impacting this open-source <a href="https://infosec.exchange/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a> solution.</p><p>Read the full article at <a href="https://security.humanativaspa.it/an-analysis-of-the-keycloak-authentication-system" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.humanativaspa.it/an-a</span><span class="invisible">nalysis-of-the-keycloak-authentication-system</span></a></p>
securityaffairs<p>Third-Party Identities: The Weakest Link in Your Cybersecurity <a href="https://infosec.exchange/tags/Supply" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Supply</span></a> <a href="https://infosec.exchange/tags/Chain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chain</span></a><br><a href="https://securityaffairs.com/170324/security/third-party-identities-cybersecurity-supply-chain.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/170324/sec</span><span class="invisible">urity/third-party-identities-cybersecurity-supply-chain.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a></p>
Guardians Of Cyber<p>💡 Did you know that 67% of organizations are already adopting the Principle of Least Privilege (PoLP) to minimize security risks? 💡</p><p>Limiting user permissions is one of the simplest, yet most powerful ways to protect sensitive data from threats—both internal and external.</p><p>How do you handle permissions in your organization? Do you apply least privilege principles?</p><p>Learn more about how PoLP can strengthen your security here: <a href="https://guardiansofcyber.com/learning-hub/least-permissions-model/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">guardiansofcyber.com/learning-</span><span class="invisible">hub/least-permissions-model/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/GuardiansOfCyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GuardiansOfCyber</span></a> <a href="https://infosec.exchange/tags/DataProtection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataProtection</span></a> <a href="https://infosec.exchange/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroTrust</span></a> <a href="https://infosec.exchange/tags/PoLP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PoLP</span></a> <a href="https://infosec.exchange/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a> <a href="https://infosec.exchange/tags/PAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PAM</span></a> <a href="https://infosec.exchange/tags/SecurityBestPractices" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityBestPractices</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/Guardians" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Guardians</span></a> <a href="https://infosec.exchange/tags/TechTips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechTips</span></a></p>
GÉANT<p>The <a href="https://mstdn.social/tags/TNC25" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TNC25</span></a> Call for Proposals for single presentations and side meetings is now open!</p><p>Whether you’re a long-standing member of the community, or have just joined the <a href="https://mstdn.social/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a> and <a href="https://mstdn.social/tags/education" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>education</span></a> world and are working on a cool project, TNC25 invites you to submit your proposals!</p><p>➡️ Check guidelines &amp; apply before 28 Nov: <a href="https://tnc25.geant.org/submit" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">tnc25.geant.org/submit</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/NRENs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NRENs</span></a> <a href="https://mstdn.social/tags/HigherEducation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HigherEducation</span></a> <a href="https://mstdn.social/tags/HigherEd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HigherEd</span></a> <a href="https://mstdn.social/tags/Networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Networking</span></a> <a href="https://mstdn.social/tags/Network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Network</span></a> <a href="https://mstdn.social/tags/connectivity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>connectivity</span></a> <a href="https://mstdn.social/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://mstdn.social/tags/TrustAndIdentity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TrustAndIdentity</span></a> <a href="https://mstdn.social/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a> <a href="https://mstdn.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/OpenScience" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenScience</span></a> <a href="https://mstdn.social/tags/HPC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HPC</span></a> <a href="https://mstdn.social/tags/Quantum" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Quantum</span></a> <a href="https://mstdn.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a></p>
yawnbox :rebel:<p><a href="https://disobey.net/tags/WindowsHello" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsHello</span></a> will soon offer users an option to sync their passkeys to their Microsoft account making them no longer device-bound</p><p>again, this changes the threat model for enterprises, if they care about such details. a device-bound passkey means the private key material exists no where else in the world. Cloud syncing of private keys is basically the same for TOTP private seeds -- those cloud providers, while encrypting the data at rest, do in fact have clear-text access to those secrets -- making them targets of social engineers, law enforcement, nation states and other hackers.</p><p>(only an end-to-end encryption cloud storage solution like Apple's Advanced Data Protection would protect synced passkeys)</p><p>HT <span class="h-card" translate="no"><a href="https://social.tchncs.de/@jesterchen" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jesterchen</span></a></span> </p><p><a href="https://blogs.windows.com/windowsdeveloper/2024/10/08/passkeys-on-windows-authenticate-seamlessly-with-passkey-providers/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blogs.windows.com/windowsdevel</span><span class="invisible">oper/2024/10/08/passkeys-on-windows-authenticate-seamlessly-with-passkey-providers/</span></a></p><p><a href="https://disobey.net/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://disobey.net/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a> <a href="https://disobey.net/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
LeeRayl<p>In my 18 years of IAM work the biggest mistake I see is rushing to secure 1 thing not all the things.</p><p>“We need SAML for AWS for &lt;insert governance here&gt;”</p><p>That is the wrong way to start any new or rebuilding of a IAM program or project.</p><p>The complexity of IAM is worth the time to plan. </p><p>Example: defining the source of truth, ensuring the integrity and confidentiality is critical, roles and entitlements are needed, an IdP needs to be established and tested, source of truth matches the directory, syncing the directory and IdP, implementation of authentication of the users with the IdP and MFA/ZTA configured.</p><p>All that is really important and barely enough to illustrate my point of the amount of work for that one app requires Picasso like experience with a Michelangelo touch </p><p><a href="https://infosec.exchange/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a> <a href="https://infosec.exchange/tags/SSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSO</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a></p>
AWS-CloudSec.com<p>📣 Issue 64 is out. Highlights:</p><p>- Amazon Inspector enhances engine for Lambda standard scanning.<br>- AWS Serverless Application Repository now supports AWS PrivateLink.<br>- AWS CloudTrail launches network activity events for VPC endpoints (preview).<br>- AWS announces Security Group Referencing on AWS Transit Gateway.<br>- Amazon Aurora MySQL now supports RDS Data API.<br>- PostgreSQL 17.0 is now available in Amazon RDS Database preview environment.<br>- Chatbot management policy introduced in AWS Organizations.<br>- Amazon SES adds HTTPS open tracking for custom domains.<br>- Amazon Redshift announces mTLS support for Amazon MSK.<br>- Storm-0501: Ransomware attacks expanding to hybrid cloud environments.<br>- Your AWS EC2 Has Been Hacked. What Will Happen Now? by Sena Yakut<br>- Threat brief-Unraveling SloppyLemming’s operations across South Asia.</p><p><a href="https://infosec.exchange/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://infosec.exchange/tags/iam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iam</span></a> <a href="https://infosec.exchange/tags/threat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threat</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p><p><a href="https://aws-cloudsec.com/p/issue-64" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">aws-cloudsec.com/p/issue-64</span><span class="invisible"></span></a></p>
Bob Young<p>"What was the name of your first pet?" NIST SP 800-63B latest authentication guidelines and requirements.<br>Highly technical, and very long. Nevertheless, if you're in cybersecurity and involved with authentication, you should read it.</p><p>The screenshot is from the most recent version I'm aware of, dated 28 August 2024.</p><p><a href="https://infosec.exchange/tags/CallMeIfYouNeedMe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CallMeIfYouNeedMe</span></a> <a href="https://infosec.exchange/tags/FIFONetworks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FIFONetworks</span></a> </p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a> <a href="https://infosec.exchange/tags/NIST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NIST</span></a></p><p><a href="https://pages.nist.gov/800-63-4/sp800-63b.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pages.nist.gov/800-63-4/sp800-</span><span class="invisible">63b.html</span></a></p>
Identity at the Center<p>Join us on the latest episode of the Identity at the Center podcast as we explore the critical components of a successful IAM program. We break down the key elements required to build a solid foundation for your IAM program and set you up for success. </p><p>Watch at <a href="https://www.youtube.com/watch?v=5-kRe187AG0" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=5-kRe187AG</span><span class="invisible">0</span></a> or listen in your podcast app.</p><p><a href="https://infosec.exchange/tags/iam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iam</span></a> <a href="https://infosec.exchange/tags/podcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>podcast</span></a> <a href="https://infosec.exchange/tags/idac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>idac</span></a></p>
Paul Sanders 😎<p>Identity and Access management (<a href="https://infosec.exchange/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a>) is such a critical component to any <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> / <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> architecture. </p><p>Never mind the business improvements and benefits that can come from managing users and access. </p><p>So, I’ve decided to offer a free discovery call to run through where you are with identity, what issues you face and what the art of the possible it. </p><p>At the end of it - I’ll even drop you a report with everything we discussed and some extra recommendations on what else can be done. </p><p>Feel free to book some time with me below:</p><p><a href="https://content.yobah.co.uk/how-does-your-identity-strategy-stack-up" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">content.yobah.co.uk/how-does-y</span><span class="invisible">our-identity-strategy-stack-up</span></a></p>
GÉANT<p>🌊 🎡 TNC is setting sail for <a href="https://mstdn.social/tags/Brighton" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Brighton</span></a>!</p><p>We are excited to announce that <a href="https://mstdn.social/tags/TNC25" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TNC25</span></a> will take place from 9 to 13 June 2025 in Brighton, UK - Hosted by Jisc!</p><p>👉 <a href="https://tnc25.geant.org" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">tnc25.geant.org</span><span class="invisible"></span></a></p><p>TNC is the largest and most prestigious <a href="https://mstdn.social/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a> &amp; <a href="https://mstdn.social/tags/education" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>education</span></a> <a href="https://mstdn.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> conference, attracting a diverse audience of &gt;800 participants from &gt;70 countries.</p><p><a href="https://mstdn.social/tags/NRENs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NRENs</span></a> <a href="https://mstdn.social/tags/Innovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Innovation</span></a> <a href="https://mstdn.social/tags/science" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>science</span></a> <a href="https://mstdn.social/tags/Network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Network</span></a> <a href="https://mstdn.social/tags/Europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europe</span></a> <a href="https://mstdn.social/tags/eInfrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eInfrastructure</span></a> <a href="https://mstdn.social/tags/eduroam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eduroam</span></a> <a href="https://mstdn.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mstdn.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mstdn.social/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://mstdn.social/tags/trustandidentity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>trustandidentity</span></a> <a href="https://mstdn.social/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a> <a href="https://mstdn.social/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mstdn.social/tags/openscience" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openscience</span></a></p>