norden.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Moin! Dies ist die Mastodon-Instanz für Nordlichter, Schnacker und alles dazwischen. Folge dem Leuchtturm.

Administered by:

Server stats:

3.6K
active users

#zerotrust

3 posts3 participants0 posts today

My son is 12-year old son is creating an online game and asked "why do users have to login to be on the game's leaderboard." This prompted a discussion about how authentication and authorization are often confused and how they play distinct yet complementary roles in protecting each players games scores for his website. I explained the two as follows:

Authentication (AuthN) asks the question "Are you who you say you are?" It verifies an identity using credentials like passwords, biometrics, or MFA.

Authorization (AuthZ) asks "What are you allowed to do?" It determines what actions, or resources, you have access to after authentication.

You authenticate first (prove your identity), then get authorized (granted permissions). Without both, security is incomplete. The two concepts work in concert to prevent unauthorized system access or data tampering.

I know that probably wasn't the coolest conversation between a father and son, but his gaming site now has a user login page. :)

🎉More Big News! 🎈🎈🎈

Please join us in welcoming Beachhead Solutions as an official sponsor of ITSPmagazine.

Beachhead Solutions provides hashtag#cloud-managed device security that enables businesses to enforce hashtag#encryption, control data access remotely, and instantly prove regulatory compliance across all endpoints—PCs, Macs, servers, phones, tablets, and USBs.

🔗 Explore their brand page on ITSPmagazine:
lnkd.in/gP2RfpCa

📢 Help us spread the word—tag your team, your peers, your fellow defenders.

Visit Beachhead Solutions Website 👉 itspm.ag/beachhead-solutions-r

Welcome aboard, Beachhead Solutions! ✨ 👏 ✨ 👏 ✨ 👏

— Sean Martin, CISSP & Marco Ciappelli
#cybersecurity #infosec #infosecurity #technology,#dataprotection,#zerotrust #endpointsecurity #managedsecurity #MSPs

Trau, schau, wem! In anderen sozialen Netwerken tauschen sich Privatpersonen u. Unternehmen gerade darüber aus, wie hilfreich es doch sei, öffentliche u. private Chat-Verläufe von Messengern (WhatsApp, Instagram usw.) herunterzuladen, dann bei ChatGPT wieder hochzuladen, um die Verläufe und das "Gesagte" von Kontaktpersonen zu analysieren. Die Kontakte und Follower, und somit die Betroffenen, erfahren davon nichts!

Replied in thread

@ct_Magazin

IT-Sicherheit: Reaktiv oder endlich proaktiv?

Jahrzehntelang rennen wir Sicherheitslücken hinterher, während Hacker immer neue Schwachstellen ausnutzen. Mathematisch gehärtete Architekturen & Zero-Trust-Modelle könnten die Lösung sein – aber warum setzen wir sie nicht konsequent um?

🔹 Patch-Zyklus: ewige Abwehr oder modernes Design?
🔹 Digitale Souveränität vs. Big-Tech-Abhängigkeit?
🔹 Wie können neue Security-Architekturen für IT-Systeme aussehen?

Was meint ihr? Sind wir zu sehr in veralteten Sicherheitsmodellen gefangen? 🤔

📢 BigTech built walls. We break them.
🔥 Decentralized. Secure. Untouchable.
💡 BigTech refused to build a world with 100% privacy & security – because it would end their business model.
💥 If we don’t act now, their control will be irreversible.

🚀 This is already bigger than they expected – and growing every day.
💡 If you believe in real digital sovereignty, prove it. Boost this. Spread the word. Join the movement.

📩 Want to contribute? Secure contact:
🔹 Telegram: @Tbyd2025
🔹 Follow us on LinkedIn: linkedin.com/company/take-back-your-data

Navigating the AI-Powered Cyber Threat Landscape of 2025: Essential Strategies for Businesses

As AI technology evolves, so do the tactics of cybercriminals, making traditional security measures obsolete. This article explores expert insights on how businesses can fortify their defenses against...

news.lavx.hu/article/navigatin

🎙️✨ #AI #Security #ZeroTrust

A Short Brand Story: Conversation from ThreatLocker Zero Trust World 2025 #ztw25 : An inforcer Brand Story with Rachel Harris

In today’s #cybersecurity landscape, compliance isn’t just a checkbox—it’s a critical component of a strong security posture. But how can #MSPs and businesses simplify compliance while reinforcing #ZeroTrust principles?

In this ITSPmagazine Short Brand Story from ThreatLocker #ZeroTrustWorld2025, Sean Martin and Marco Ciappelli spoke with Rachel Harris, Director of Partnerships at Inforcer, about how their automated compliance and #securitysolutions help businesses stay ahead of evolving regulations without adding complexity.

#Security and compliance should work together, not against each other. Discover how Inforcer is making compliance easier, smarter, and more effective.

🎧 Listen now: brand-stories-podcast.simpleca

📌 Learn more about Inforcer: itspmagazine.com/directory/inf

Learn more and catch more stories from ThreatLocker Zero Trust World: itspmagazine.com/zero-trust-wo

Learn more and catch more stories from #ThreatLocker: itspm.ag/threatlocker-r974
__________________________________________

Catch all of our event coverage on ITSPmagazine:
itspmagazine.com/on-location

Want to tell your Brand Story Briefing as part of our event coverage?
Learn More 👉 itspm.ag/evtcovbrf

Want Sean and Marco to be part of your event or conference?
Let Us Know 👉 itspmagazine.com/contact-us

Continued thread

System Administration

Week 4, Multiuser Fundamentals

We don't have a video for this segment, but here are the slides discussing group dynamics, foundations of trust (and #ZeroTrust), like Least Privilege, headless users or service accounts, group permissions, many examples of different forms of multi-factor authentication #mfa, and raising privileges (a topic we'll come back to again later in the semester).

stevens.netmeister.org/615/sli