| Website | https://j.vehent.org |
| Work | https://www.youtube.com/watch?v=QZ0cpBocl3c |
| Book | https://securing-devops.com/ |
| Blog | https://jvehent.org |
| Photography | https://glass.photo/jve |
| Website | https://j.vehent.org |
| Work | https://www.youtube.com/watch?v=QZ0cpBocl3c |
| Book | https://securing-devops.com/ |
| Blog | https://jvehent.org |
| Photography | https://glass.photo/jve |
New blog post: Important trends in Cybersecurity.
Some observations on how our field is evolving in four distinct areas: security keys, reduction in attack surfaces, regulatory compliance and shifting left.
https://jvehent.org/2023/12/08/Important-Trends-In-Cybersecurity.html
Some observations on how our field is evolving in four distinct areas: security keys, reduction in attack surfaces, regulatory compliance and shifting left,. Security keys Perhaps the most impactful trend to security posture is the move away from passwords to security keys, which has eliminated an incredibly large attack surface entirely. We have seen again and again that organizations that fully adopt security keys and webauthn can prevent phishing and password stuffing attacks entirely, but a fair amount of skepticism remained on the maturity of security keys and their practical daily use. This is changing. Most, if not all, tech companies now require security keys internally and have matured the tooling to manage them. Google Workspace and Microsoft 365 have first class support of security keys, making it easy for administrators to issue and manage the keys.
LEGO made 2 billion in profits last year, but changing their factories for sustainability is too much of an effort...
https://www.axios.com/2023/09/25/lego-oil-free-bricks-recycled-bottles-plan-ditched