#Z%C3%A9roTrust

2025-05-22

KeeperPAM is now listed on CISA’s CDM Approved Products List. Our zero-trust privileged access management solution enables federal agencies to secure credentials, enforce least-privilege access and meet FedRAMP and NIST compliance requirements.

Learn more here: bit.ly/4j7z10Z.

#ZeroTrust #CISA #FedRAMP #NIST

2025-05-22

@nixCraft @thelinuxEXP am I the only one to find that nearly ALL zero trust services … are not zero trust services as if they go rogue … you are screwed ?

#fake #lie #zerotrust #trust #marketing

Annexus Technologiesannexustechologies
2025-05-22

Is your network ready for 2025? The latest SSE Adoption Report reveals how 700+ security leaders are future-proofing their infrastructure with SSE, SASE, and Zero Trust.

community.hpe.com/t5/networkin

Marco Ciappelli🎙️✨:verified: :donor:Marcociappelli@infosec.exchange
2025-05-22

Always a pleasure spending time with Rob Allen and the whole ThreatLocker team - virtually or in person (better!!!) 😬

🎙️✨ Why Simplicity Might Be the Missing Ingredient in Your #ZeroTrust Strategy | An ITSPmagazine Brand Story with Rob Allen from ThreatLocker | #RSAC2025

At #RSAC Conference 2025, the ThreatLocker booth didn’t need flashing lights or gimmicks. Just a live PowerShell attack, a rubber ducky, and a crowd watching real protection in action. That’s how you cut through the noise.

In this Brand Story episode, Sean Martin, CISSP and Marco Ciappelli talk with Rob Allen, Chief Product Officer at ThreatLocker, about why Zero Trust doesn’t need to be complicated to be effective. Instead of piling on tools, Rob explains why proactive control, vendor consolidation, and human connection are the real differentiators.

🙌 Huge thanks to #ThreatLocker for sponsoring our RSA Conference 2025 coverage and supporting meaningful conversations like this one.

🎥 Watch the episode: youtu.be/pPZ2VEeTdBo

🎧 Listen to the podcast: brand-stories-podcast.simpleca

📝 Read the full article: itspmagazine.com/their-stories

We’re still reflecting on RSAC 2025 — and this conversation reminded us that sometimes, the simplest solutions are the most powerful.

🔜 Next stop: Infosecurity Europe 2025 in London!
Follow our coverage as it unfolds — and if you’re a cybersecurity company attending the show, reach out to connect with us on site. Let’s keep the conversations going.

#cybersecurity, #zerotrust, #RSAC2025, #ThreatLocker, #infosec, #endpointsecurity, #brandstory, #threatprevention, #vendorconsolidation, #itspmagazine, #infosecurityeurope2025, #infosecurityeurope

2025-05-21

Imagine if every patch update was treated like a potential threat. ThreatLocker’s zero trust approach audits every change before deployment, keeping vulnerabilities in check and hackers at bay. Ready for a security revolution?

thedefendopsdiaries.com/threat

#threatlocker
#patchmanagement
#zerotrust
#cybersecurity
#infosec

2025-05-21

🔐 Microsoft is taking Zero Trust to the next level! Protecting both #AI agents and human workers, ensuring top-notch security in our digital world. Check it out 🌐 #ZeroTrust #SecureAI

microsoft.com/en-us/security/b

Bogomil Shopov - Богоbogo@hapyyr.com
2025-05-20

I decided to share some of my observations that would benefit you if you are building applications: a deep dive session into the archetypes of attackers.

This session is for people who are developing software of any kind. It could be an API endpoint, a blog, or a complex application used by millions.

Join in or share with smart people.

Let me help you!

talkweb.eu/whos-attacking-you/
#cybersecurity #threatmodeling #zerotrust

ByteSectorXbytesectorx
2025-05-19

Ready to level up your network security? 🛡️ Our latest blog post dives into advanced network segmentation strategies with a Zero Trust approach. Learn how to minimize attack surfaces & contain threats! A must-read for any cybersecurity pro!

bytesectorx.blogspot.com/2025/

2025-05-19

So I've looked into several so-called "zero-trust" solutions. They are aptly named: I have zero trust in them.

1) they depict the traditional approach as a flat network. This is a bad faith argument: in virtual environments, there is nothing stopping you from implementing tiered infrastructure except being lazy or incompetent.
2) "let's have one single cluster handling both dev and ops traffic, both dev and prod traffic!" What could go wrong? Oh yeah, a single vulnerability exploited and your attacker can escalate to the maximum privileges of your infrastructure.
3) "let's inject/broker credentials into your connections by performing a meddle-in-the-middle attack!" Because heartbleed never taught us anything about the risks of arbitrary memory read in a service exposed to the Internet!
4) "Let's replace your old OpenSSH daemon by our own agent that reverse-connect to our cluster, so that you can bypass your pesky firewalls!" Firewall rules are under your control, mate; maybe change them so that reading them gives you the correct list of authorized flows? Also, what about glass-break scenarios where your zero-trust cluster is down?
5) "Our proprietary coordination server hosted on our infrastructure is highly available!" Sure mate, but Internet is not highly available so a single BGP incident can prevent me from revoking access to my infrastructure. If I need to revoke access, I need to do it fast.

And the list goes on and on. What a shit show.

#infrastructure #ztna #teleport #zerotrust #infosec

2025-05-18

A new talk from BSidesFrankfurt 2024 is now live on YouTube!

Zero Trust - Attack and Defend by Aaron Jewitt
Aaron shows how Elastic built advanced automation into their SIEM to reliably detect novel attacks in a Zero Trust environment - without overwhelming analysts with false positives. Learn how to automate alerts for suspicious API token or key use from outside your environment and get practical insight into defending modern infrastructures.

Watch now: youtu.be/kkEtCVZiECA

Don't forget to subscribe to our channel for more cutting-edge cybersecurity content!

#BSidesFrankfurt #CyberSecurity #ZeroTrust #SIEM #ThreatDetection #ITSecurity #Infosec

ByteSectorXbytesectorx
2025-05-18

Level up your Kubernetes security! 🚀 Our practical guide to Advanced Network Segmentation with Cilium is here. Learn how to build robust security policies and supercharge your microservices. A must-read for cloud-native devs! 🔐

bytesectorx.blogspot.com/2025/

ByteSectorXbytesectorx
2025-05-16

🔒 Level up your network security with Zero Trust! Our latest blog post dives deep into advanced network segmentation techniques, including microsegmentation & SDN. Minimize your attack surface & fortify your defenses! Ready to explore?

bytesectorx.blogspot.com/2025/

I can't tell if this Zero Trust Journey that Microsoft wants to send me on is gonna end with champagne or tears. Too much marketing bullshit covering up actually good policy? Can't tell.

microsoft.com/en-us/security/b

#microsoft #zerotrust

TechnoTenshi :verified_trans: :Fire_Lesbian:technotenshi@infosec.exchange
2025-05-15

Tinfoil uses secure GPU enclaves to run AI workloads with zero data access or retention. Data stays encrypted, verified by hardware attestation, removing trust from both app and cloud providers.

news.ycombinator.com/item?id=4

#AIPrivacy #ConfidentialComputing #ZeroTrust #SecureAI

2025-05-15

Zero-Trust-Modelle und ihr Potenzial für den Datenschutz🔒

Zero-Trust folgt dem Prinzip "Never Trust, Always Verify" - jeder Zugriff wird unabhängig von Ort und Netzwerk kontinuierlich überprüft. Dies kann den #Datenschutz durch genauere Zugriffskontrollen und bessere Nachvollziehbarkeit deutlich verbessern.

Der Artikel beleuchtet Grundprinzipien, Herausforderungen und wie von diesem Konzept profitiert werden kann.

pyngu.com/magazin/privacy/zero

#Datensicherheit #ZeroTrust
#pyngumagazin #pyngurocks

2025-05-14

JPMorganChase CISO Patrick Opet’s open letter at #RSAC2025 called out the security debt in SaaS + cloud. The message: we’re trading foundational security for speed, and it’s catching up to us.
My take: It's not a standards problem. It’s a will problem.
#identity #Infosec #SaaS #ZeroTrust #Security
blog.talkingidentity.com/2025/

Picture of a parkour enthusiast jumping from one crumbling wall to another.
2025-05-11

Vor 84 Jahren – am 11. Mai 1941 – hat Konrad #Zuse in Zusammenarbeit mit Helmut #Schreyer die #Z3 vollendet, den ersten funktionsfähigen, frei programmierbaren Rechner der Welt. Perfekt umgesetzt: #AirGap by Design, #ZeroTrust durch Einzelzugriff, keine Cloud, kein Netzwerk, kein Admin-Account. 🙂

Screenshot eines Mastodon-Beitrags im Dunkelmodus: Oben links ein Profilfoto von Konrad Zuse; daneben Name und Datum „11. Mai 1941“. Darunter der Text: „Gerade die Z3 fertiggestellt – der erste funktionsfähige, frei programmierbare Rechner der Welt! #Z3 #ComputerPionier“. Im eingebetteten Foto lächelt Konrad Zuse und hält den rechten Arm gestreckt, als würde er ein Selfie mit einem Smartphone machen. Hinter ihm steht ein großflächiger Relais-Computer mit beleuchteten Anzeige- und Bedienpulten in einem hellen Ausstellungsraum. Unter dem Bild zeigt eine Herz-Zeile, dass der Beitrag von den zwei bekannten Tech-Größen Steve Jobs und Bill Gates und insgesamt 378 Personen favorisiert wurde; daneben kleine runde Avatare dieser beiden Persönlichkeiten.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst