GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Dan Kennedy :verified: :verified: :verified: :verified: (danielkennedy74@infosec.exchange)

  1. Embed this notice
    Dan Kennedy :verified: :verified: :verified: :verified: (danielkennedy74@infosec.exchange)'s status on Saturday, 04-Oct-2025 08:34:41 JST Dan Kennedy :verified: :verified: :verified: :verified: Dan Kennedy :verified: :verified: :verified: :verified:

    "But we've been talking about this <insert security thing> for a while now..."

    Steps:

    1. Talk about problem, build scale in talking about problem.
    2. Market begins to think about different ways to solve problem.
    3. Approaches are tried, funding happens, some fail, some win, many become part of larger platforms.
    4. Solutions begin to scale, and become widely adopted, practitioners become familiar with them, attackers adjust, advancements are made, common (best) practices develop.

    Every step is worth talking about, every shift is news, and Rome wasn't built in a day.

    Stop being bored with progress in security.

    In conversation about 2 months ago from infosec.exchange permalink
  2. Embed this notice
    Dan Kennedy :verified: :verified: :verified: :verified: (danielkennedy74@infosec.exchange)'s status on Friday, 12-Sep-2025 06:16:31 JST Dan Kennedy :verified: :verified: :verified: :verified: Dan Kennedy :verified: :verified: :verified: :verified:

    Nonhuman identities (NHIs) — such as machine identities, service accounts and application credentials — have always been a distinctive part of identity management, where approaches focus on persistent credentials for human users rather than emphasizing ephemeral access for machine users. With some reports indicating that NHIs outnumber human identities 50 to one, managing the sprawl of these identities, including permissions that maintain the principle of least privilege and knowing who owns what, has always been a challenge for security teams. Yet, NHIs are a vital component of automation strategies. Some key challenges include a lack of visibility into their activity and related difficulties in auditing, over-permissioning, and even application security issues, such as secrets management. The rise of agentic AI, especially agents acting on behalf of users, promises to make an already complex issue even more complicated. In fact, agent behavior blurs the line between human users and NHIs. Two-fifths (41%) of organizations are already using third-party security tools to help manage NHIs, 18% are running proof-of-concept projects, and another 15% plan to implement them within the next six months.

    https://blog.451alliance.com/agentic-ai-complicates-an-already-complicated-picture-around-non-human-identities/

    In conversation about 3 months ago from infosec.exchange permalink
  3. Embed this notice
    Dan Kennedy :verified: :verified: :verified: :verified: (danielkennedy74@infosec.exchange)'s status on Tuesday, 25-Mar-2025 07:39:08 JST Dan Kennedy :verified: :verified: :verified: :verified: Dan Kennedy :verified: :verified: :verified: :verified:
    in reply to
    • BrianKrebs

    @briankrebs

    In conversation about 8 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/219/109/671/652/360/original/6d075a934654bd6b.png

User actions

    Dan Kennedy :verified: :verified: :verified: :verified:

    Dan Kennedy :verified: :verified: :verified: :verified:

    AppDev, AppSec VP, FinCo CISO now Research. Spend my days talking to CISOs. Tweets and opinions are my own, a10wn. #infosec

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          336914
          Member since
          24 Mar 2025
          Notices
          3
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.