Nishant Kaushik

Identity, Security & Privacy Maven | Solver of Problems | Mentalic, First Class | Family Man | CTO at Uniken.com | Recommended by 4 out of 5 Identirati

2025-05-22

On the one hand, this is a fascinating read about good old fashioned investigative work. On the other hand, it is a dire illustration of the #privacy implications of our digital exhaust, and the vast troves of data about us that is already out there and that we generate each day.
wired.com/story/find-my-iphone

2025-05-14

JPMorganChase CISO Patrick Opet’s open letter at #RSAC2025 called out the security debt in SaaS + cloud. The message: we’re trading foundational security for speed, and it’s catching up to us.
My take: It's not a standards problem. It’s a will problem.
#identity #Infosec #SaaS #ZeroTrust #Security
blog.talkingidentity.com/2025/

Picture of a parkour enthusiast jumping from one crumbling wall to another.
2025-05-07

This feels like the first (of probably many) truly meaningful AI-powered solutions I've seen. Importantly, the article highlights something inclusion advocates say all the time: great ideas emerge when you make sure you have a diverse team. #AI #Inclusion #Accessibility #ForAllByAll
wired.com/story/silence-speaks

Image from article showing AI generated ASL interpreters.
2025-05-06

@thorsheim There are definitely signs of adoption, and success stories at scale. They’re just too few and far between. But there could be a snowball effect if folks pay attention.

2025-05-05

My #RSAC2025 headline: #AI is everywhere, but trust & control haven’t caught up.
- Agent memory is a new attack surface.
- #Identity is fragmenting.
- #Security budgets aren't ready for AI costs.
We’re not securing users anymore - we’re securing decisions.
Check out my full thoughts below.
blog.talkingidentity.com/2025/

2025-04-27

As RSA Conference kicks off, it’s cool to see #identity management get highlighted in this CSO Online article as a topic that will “dominate” the agenda, as well as a callout that the #passwordless (re)evolution is finally here. Attendees should definitely check out the talks in the Identity track because there’s a little bit of everything in there: from best practices, technical solutions, and top concerns for those tackling today’s problems, to interesting developments that could shape tomorrow’s digital experiences.
#IAM #RSAC2025
csoonline.com/article/3965415/

2025-04-27

@wendynather The ambiguity of this message is …

Nishant Kaushik boosted:
mhoyemhoye
2025-04-27

I think that @theverge is underselling it - the gold here isn’t the chrome browser, it’s chrome’s automatic background update system. It’s root on billions of machines.

theverge.com/chrome/656613/goo

2025-04-22

I have it on reasonable authority from folks I know that this is indeed how things work, autistic or not.

“Self-employed” autistic woman actually works for cat thedailytism.com/self-employed

2025-04-18

And they didn't even have to use AI to do this!
Seriously though, the ability to discern authentic from fraud is going to hit everyone, no matter where they are on the digital literacy scale. #Fraud
the420.in/monk-duped-digital-a

2025-04-17

Chatbots powered by AI are being groomed through disinfo ops that do LLM poisoning attacks at scale. How #AI systems get gamed or manipulated is critical to understand as more #identity and #security ops begin to rely on them.
washingtonpost.com/technology/

2025-04-14

We have a new term for a software supply chain vulnerability: slopsquatting.
Theat actors observe that LLM-generated code frequently tries to incorporate code from online software packages that don’t exist. So they set up malware under that name, infecting the generated code. #Security #AI
theregister.com/2025/04/12/ai_

2025-04-10

As I’ve tried to understand MCP, I am struck by something, and I am wondering if I’m somehow not finding crucial literature (or it's not prominently featured enough). The majority of what I read talks about orgs standing up a local MCP server in front of their various services. What I am barely seeing is guidance on how those MCP servers should be designed/deployed to securely protect the access credentials (API Keys, SSH Keys, or long-lived tokens) the MCP server will need to accomplish this. Am I missing something, or are we speedrunning towards a new #security nightmare?
#NHI #API #Honeypots
(On a related note, I highly encourage everyone to read Aaron Parecki's post about OAuth and MCP: aaronparecki.com/2025/04/03/15)

Abstract image of a cloudy blob cuboid connected by cables to a gelatinous cube.
2025-04-06
2025-04-03

Default passwords (in this case voicemail PIN) strike again! There are many #AuthN systems around that support sending OTPs by a phone call as an alternative/fallback to SMS (and is an accessibility requirement). Unfortunately, they can't account for this attack vector.
(Oh, and use Signal, not Telegram)
#Identity #Security
gbhackers.com/hackers-hijack-t

2025-04-02

@sphcow Fitting, since I always look up to you. 😛

2025-04-02

The insatiable hunger to feed #LLMs and #AI is parasitically draining the commons and public internet. Bandwidth costs are spiking as crawlers take data for training and information. For Wikipedia, the lack of attribution means no visitors, no donors, just cost. The #ethics of AI are failing here.

I saw Tim Karr on bluesky suggest that AIs should pay fees or a tax (should that be tariffs?) into a fund that supports public content. Services like Cloudflare and Fastly that defend against bots are evolving for crawlers. In #identity, the implications for #AgenticAI, #AI, and #NHI are vast.

diff.wikimedia.org/2025/04/01/

2025-03-21

Fraud never sleeps. Tap-to-pay using NFC is assumed to be pretty secure. And it is, until it isn’t. This is a new kind of #payment threat I hadn’t heard of before - relying on a custom Android app to relay tap-to-pay transactions from mobile devices located in China.
#Fraud #Security #Phishing

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst