mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.6K
active users

#identitymanagement

2 posts2 participants0 posts today
Pyrzout :vm:<p>Identity management was hard, AI made it harder <a href="https://www.helpnetsecurity.com/2025/09/08/ai-driven-identity-management-report/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/09/08</span><span class="invisible">/ai-driven-identity-management-report/</span></a> <a href="https://social.skynetcloud.site/tags/Artificialintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Artificialintelligence</span></a> <a href="https://social.skynetcloud.site/tags/identitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>identitymanagement</span></a> <a href="https://social.skynetcloud.site/tags/datasecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datasecurity</span></a> <a href="https://social.skynetcloud.site/tags/automation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>automation</span></a> <a href="https://social.skynetcloud.site/tags/SailPoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SailPoint</span></a> <a href="https://social.skynetcloud.site/tags/report" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>report</span></a> <a href="https://social.skynetcloud.site/tags/survey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>survey</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a></p>
Kevin Veen-Birkenbach<p><strong>Infinito.Nexus: Der komplette Entwicklungs-Stack in unter zwei Stunden</strong></p> Softwareentwicklungsfirmen stehen oft vor der Herausforderung, zahlreiche Systeme zur Zusammenarbeit, Versionsverwaltung, Kommunikation, Dokumentation und Sicherheit aufzusetzen. Infinito.Nexus löst dieses Problem in weniger als zwei Stunden – modular, automatisiert und vollständig integriert. […] <p><a href="https://blog.infinito.nexus/blog/2025/09/06/infinito-nexus-der-komplette-entwicklungs-stack-in-unter-zwei-stunden/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.infinito.nexus/blog/2025/</span><span class="invisible">09/06/infinito-nexus-der-komplette-entwicklungs-stack-in-unter-zwei-stunden/</span></a></p>
iX Magazin<p>iX-Workshop: Microsoft 365 sicher einrichten und datenschutzkonform betreiben</p><p>Microsoft 365 sicher betreiben und notwendige Maßnahmen in Bezug auf Datenschutz und Informationssicherheit umsetzen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Microsoft-365-sicher-einrichten-und-datenschutzkonform-betreiben-10607386.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Micr</span><span class="invisible">osoft-365-sicher-einrichten-und-datenschutzkonform-betreiben-10607386.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://social.heise.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.heise.de/tags/DSGVO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DSGVO</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
iX Magazin<p>iX-Workshop: Active Directory Hardening – Vom Audit zur sicheren Umgebung</p><p>Lernen in einer Übungsumgebung: Sicherheitsrisiken in der Windows-Active-Directory-Infrastruktur erkennen und beheben, um die IT vor Cyberangriffen zu schützen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Active-Directory-Hardening-Vom-Audit-zur-sicheren-Umgebung-10607280.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Acti</span><span class="invisible">ve-Directory-Hardening-Vom-Audit-zur-sicheren-Umgebung-10607280.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://social.heise.de/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
iX Magazin<p>iX-Workshop Keycloak: Die Grundlagen für effizientes IAM und SSO</p><p>SSO und Multifaktor-Authentifizierung – mehr Sicherheit und einfache Zugangsverwaltung mit dem OpenID-Connect-Provider Keycloak.</p><p><a href="https://www.heise.de/news/iX-Workshop-Keycloak-Die-Grundlagen-fuer-effizientes-IAM-und-SSO-10606500.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Keyc</span><span class="invisible">loak-Die-Grundlagen-fuer-effizientes-IAM-und-SSO-10606500.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
gyptazyKanidm (written in Rust) as identity provider for <a href="https://gyptazy.com/fedi?t=proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#Proxmox</a> with OAuth / OIDC.<br><br><a href="https://gyptazy.com/fedi?t=kanidm" class="mention hashtag" rel="nofollow noopener" target="_blank">#kanidm</a> <a href="https://gyptazy.com/fedi?t=idm" class="mention hashtag" rel="nofollow noopener" target="_blank">#idm</a> <a href="https://gyptazy.com/fedi?t=rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#rust</a> <a href="https://gyptazy.com/fedi?t=proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#proxmox</a> <a href="https://gyptazy.com/fedi?t=identitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#identitymanagement</a> <a href="https://gyptazy.com/fedi?t=opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#opensource</a> <a href="https://gyptazy.com/fedi?t=oauth" class="mention hashtag" rel="nofollow noopener" target="_blank">#oauth</a> <a href="https://gyptazy.com/fedi?t=oidc" class="mention hashtag" rel="nofollow noopener" target="_blank">#oidc</a> <a href="https://gyptazy.com/fedi?t=ldap" class="mention hashtag" rel="nofollow noopener" target="_blank">#ldap</a> <a href="https://gyptazy.com/fedi?t=authentik" class="mention hashtag" rel="nofollow noopener" target="_blank">#authentik</a> <a href="https://gyptazy.com/fedi?t=virtualization" class="mention hashtag" rel="nofollow noopener" target="_blank">#virtualization</a> <a href="https://gyptazy.com/fedi?t=howto" class="mention hashtag" rel="nofollow noopener" target="_blank">#howto</a><br><br><a href="https://gyptazy.com/blog/kanidm-with-proxmox-and-oidc-the-full-setup/" rel="nofollow noopener" target="_blank">https://gyptazy.com/blog/kanidm-with-proxmox-and-oidc-the-full-setup/</a><br><br>
iX Magazin<p>iX-Workshop API-Sicherheit: OWASP Top 10 API Security Risks</p><p>Lernen Sie hands-on, wie Sie Schwachstellen in der API-Implementierung vermeiden und Angriffe abwehren.</p><p><a href="https://www.heise.de/news/iX-Workshop-API-Sicherheit-OWASP-Top-10-API-Security-Risks-10539124.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-API-</span><span class="invisible">Sicherheit-OWASP-Top-10-API-Security-Risks-10539124.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/API" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>API</span></a> <a href="https://social.heise.de/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://social.heise.de/tags/HTTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HTTP</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/OWASP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OWASP</span></a> <a href="https://social.heise.de/tags/Schnittstellen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Schnittstellen</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
iX Magazin<p>iX-Workshop: Microsoft 365 sicher einrichten und datenschutzkonform betreiben</p><p>Microsoft 365 sicher betreiben und notwendige Maßnahmen in Bezug auf Datenschutz und Informationssicherheit umsetzen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Microsoft-365-sicher-einrichten-und-datenschutzkonform-betreiben-10539128.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Micr</span><span class="invisible">osoft-365-sicher-einrichten-und-datenschutzkonform-betreiben-10539128.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://social.heise.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.heise.de/tags/DSGVO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DSGVO</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Marco Ciappelli🎙️✨:verified: :donor:<p>🎯 FINAL POST FROM THE FLOOR: <a href="https://infosec.exchange/tags/BlackHatUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHatUSA</span></a> 2025 Coverage!</p><p>Access Roulette: How to Stop Betting Your Security on Standing Privileges</p><p>This wraps up our on-location content from Las Vegas! </p><p>Next week we'll reconnect with our main event sponsors— BLACKCLOAK, Dropzone AI, Stellar Cyber, and Akamai Technologies—to bring you their post-event insights and feedback. Of course ThreatLocker's recap was already captured on the floor and published earlier today. Plus, watch for our closing reflection articles from me Marco Ciappelli and Sean Martin, CISSP!</p><p>Our final floor conversation comes thanks to our friends at Apono 🙏</p><p>Modern enterprises are gambling with security every day. Static permissions, manual approvals, and periodic audits create "privilege creep" that turns every over-privileged account into a potential breach waiting to happen. </p><p>At <a href="https://infosec.exchange/tags/BlackHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHat</span></a> USA 2025, Ofir Stein from <a href="https://infosec.exchange/tags/Apono" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apono</span></a> reveals how to break this dangerous cycle.</p><p>The stakes keep rising: <br>• Non-human identities (service accounts, <a href="https://infosec.exchange/tags/APIs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APIs</span></a>, <a href="https://infosec.exchange/tags/AIagents" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIagents</span></a>) retain high-level privileges long after tasks complete <br>• Organizations discover risks during audits but lack scalable remediation <br>• <a href="https://infosec.exchange/tags/Business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Business</span></a> teams need rapid access while security teams battle expanding <a href="https://infosec.exchange/tags/attacksurfaces" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attacksurfaces</span></a> </p><p>Apono's Zero Standing Privilege model: <br>• Removes ALL permanent access by default <br>• Grants access dynamically based on business context <br>• Automatically revokes permissions when tasks complete <br>• Works for both human AND non-human identities <br>• Integrates with existing <a href="https://infosec.exchange/tags/identity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>identity</span></a> providers—no rip and replace</p><p>Key capabilities: <br>• Context-based policy management aligned with business objectives <br>• Continuous discovery of identities, privileges<br>• Automated remediation of unnecessary privileges <br>• Real-time anomaly detection feeding <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOC</span></a> workflows <br>• Scalable across centralized and decentralized environments</p><p>The result? <br>Engineers gain control over their access (building trust), security teams maintain tight governance, and organizations can finally stop betting their security on standing privileges.</p><p>📺 Watch the video: <a href="https://youtu.be/ciBsH84PVQU" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/ciBsH84PVQU</span><span class="invisible"></span></a></p><p>🎧 Listen to the podcast: <a href="https://brand-stories-podcast.simplecast.com/episodes/access-roulette-how-to-stop-betting-your-security-on-standing-privileges-a-brand-story-with-ofir-stein-cto-and-co-founder-of-apono-a-black-hat-usa-2025-conference-on-location-brand-story-HD5Uq_kf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">brand-stories-podcast.simpleca</span><span class="invisible">st.com/episodes/access-roulette-how-to-stop-betting-your-security-on-standing-privileges-a-brand-story-with-ofir-stein-cto-and-co-founder-of-apono-a-black-hat-usa-2025-conference-on-location-brand-story-HD5Uq_kf</span></a></p><p>📖 Read the blog: <a href="https://www.itspmagazine.com/their-stories/access-roulette-how-to-stop-betting-your-security-on-standing-privileges-a-brand-story-with-ofir-stein-cto-and-co-founder-of-apono-a-black-hat-usa-2025-conference-on-location-brand-story" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/their-stories</span><span class="invisible">/access-roulette-how-to-stop-betting-your-security-on-standing-privileges-a-brand-story-with-ofir-stein-cto-and-co-founder-of-apono-a-black-hat-usa-2025-conference-on-location-brand-story</span></a></p><p>➤ Learn more about Apono: <a href="https://itspm.ag/apono-1034" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">itspm.ag/apono-1034</span><span class="invisible"></span></a></p><p>✦ Catch more stories from Apono: <a href="https://www.itspmagazine.com/directory/apono" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/directory/apo</span><span class="invisible">no</span></a></p><p>🎪 Follow all of our <a href="https://infosec.exchange/tags/BHUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BHUSA</span></a> 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">itspmagazine.com/bhusa25</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://infosec.exchange/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroTrust</span></a> <a href="https://infosec.exchange/tags/AccessControl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AccessControl</span></a> <a href="https://infosec.exchange/tags/BlackHatUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHatUSA</span></a> <a href="https://infosec.exchange/tags/BHUSA25" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BHUSA25</span></a> <a href="https://infosec.exchange/tags/PrivilegeManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivilegeManagement</span></a> <a href="https://infosec.exchange/tags/IAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IAM</span></a> <a href="https://infosec.exchange/tags/SecurityAutomation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAutomation</span></a> <a href="https://infosec.exchange/tags/NonHumanIdentities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NonHumanIdentities</span></a></p>
iX Magazin<p>iX-Workshop API-Sicherheit: OWASP Top 10 API Security Risks</p><p>Lernen Sie hands-on, wie Sie Schwachstellen in der API-Implementierung vermeiden und Angriffe abwehren.</p><p><a href="https://www.heise.de/news/iX-Workshop-API-Sicherheit-OWASP-Top-10-API-Security-Risks-10508412.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-API-</span><span class="invisible">Sicherheit-OWASP-Top-10-API-Security-Risks-10508412.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/API" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>API</span></a> <a href="https://social.heise.de/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://social.heise.de/tags/HTTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HTTP</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/OWASP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OWASP</span></a> <a href="https://social.heise.de/tags/Schnittstellen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Schnittstellen</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
iX Magazin<p>iX-Workshop: Microsoft 365 sicher einrichten und datenschutzkonform betreiben</p><p>Microsoft 365 sicher betreiben und notwendige Maßnahmen in Bezug auf Datenschutz und Informationssicherheit umsetzen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Microsoft-365-sicher-einrichten-und-datenschutzkonform-betreiben-10508353.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Micr</span><span class="invisible">osoft-365-sicher-einrichten-und-datenschutzkonform-betreiben-10508353.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://social.heise.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.heise.de/tags/DSGVO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DSGVO</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise online English<p>Darknet offer: Tens of thousands of ID scans stolen from Italian hotels</p><p>High-priced hotels in particular were the focus of the data theft. Germans whose ID cards, driving licenses or passports were copied are also affected.</p><p><a href="https://www.heise.de/en/news/Darknet-offer-Tens-of-thousands-of-ID-scans-stolen-from-Italian-hotels-10522177.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Darknet-offer</span><span class="invisible">-Tens-of-thousands-of-ID-scans-stolen-from-Italian-hotels-10522177.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.heise.de/tags/Darknet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Darknet</span></a> <a href="https://social.heise.de/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Darknet-Angebot: Zehntausende Ausweis-Scans in italienischen Hotels geklaut</p><p>Vor allem hochpreisige Hotels standen im Fokus des Datenklaus. Betroffen sind auch Deutsche, deren Personalausweise, Führerscheine oder Pässe kopiert wurden.</p><p><a href="https://www.heise.de/news/Darknet-Angebot-Zehntausende-Ausweis-Scans-in-italienischen-Hotels-geklaut-10521928.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Darknet-Angebot-</span><span class="invisible">Zehntausende-Ausweis-Scans-in-italienischen-Hotels-geklaut-10521928.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.heise.de/tags/Darknet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Darknet</span></a> <a href="https://social.heise.de/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
iX Magazin<p>iX-Workshop: Active Directory Hardening – Vom Audit zur sicheren Umgebung</p><p>Lernen in einer Übungsumgebung: Sicherheitsrisiken in der Windows-Active-Directory-Infrastruktur erkennen und beheben, um die IT vor Cyberangriffen zu schützen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Active-Directory-Hardening-Vom-Audit-zur-sicheren-Umgebung-10508279.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Acti</span><span class="invisible">ve-Directory-Hardening-Vom-Audit-zur-sicheren-Umgebung-10508279.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Passw%C3%B6rter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passwörter</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
iX Magazin<p>iX-Workshop: Mit Keycloak zum sicheren Identity- und Access-Management</p><p>SSO und Multifaktor-Authentifizierung – mehr Sicherheit und einfache Zugangsverwaltung mit dem OpenID-Connect-Provider Keycloak.</p><p><a href="https://www.heise.de/news/iX-Workshop-Mit-Keycloak-zum-sicheren-Identity-und-Access-Management-10501314.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Mit-</span><span class="invisible">Keycloak-zum-sicheren-Identity-und-Access-Management-10501314.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
iX Magazin<p>iX-Workshop: Linux-Server vor Angriffen wirksam schützen</p><p>Linux-Server und Netzwerkdienste effektiv und umfassend vor Angriffen schützen – von physischer Sicherheit über Verschlüsselung und 2FA bis hin zu SELinux. </p><p><a href="https://www.heise.de/news/iX-Workshop-Linux-Server-vor-Angriffen-wirksam-schuetzen-10501293.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Linu</span><span class="invisible">x-Server-vor-Angriffen-wirksam-schuetzen-10501293.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>

iX-Workshop: AWS-Sicherheit - Angriffe erkennen und abwehren

Erfahren Sie, wie Angreifer Fehlkonfigurationen und mangelnde Härtung der Amazon Cloud ausnutzen und wie Sie AWS-Dienste und Cloud-Identitäten dagegen schützen.

heise.de/news/iX-Workshop-AWS-

heise online · iX-Workshop: AWS-Sicherheit - Angriffe erkennen und abwehrenBy Ilona Krause