toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

277
active users

#eSentire

0 posts0 participants0 posts today
Marco Ciappelli🎙️✨:verified: :donor:<p>🎉 A new Brand Story is live — this time with eSentire!</p><p>We sat down with Dustin Hillard, CTO at <a href="https://infosec.exchange/tags/eSentire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eSentire</span></a>, for a powerful conversation about <a href="https://infosec.exchange/tags/AgenticAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AgenticAI</span></a> and what it really means to reach human equivalency in security operations.</p><p>From decision-making to autonomous action, this isn’t just theory — it’s a real-world look at outcomes when AI is trained and tuned with purpose.</p><p>🎥 Watch the video:<br><a href="https://youtu.be/qmca7RCzSAQ" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/qmca7RCzSAQ</span><span class="invisible"></span></a></p><p>📝 Read the full story:<br><a href="https://www.itspmagazine.com/their-stories/reaching-human-equivalency-with-agentic-ai-a-real-world-look-at-security-outcomes-an-esentire-brand-story-with-dustin-hillard" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/their-stories</span><span class="invisible">/reaching-human-equivalency-with-agentic-ai-a-real-world-look-at-security-outcomes-an-esentire-brand-story-with-dustin-hillard</span></a></p><p>🔎 Learn more about eSentire here:<br><a href="https://itspm.ag/esentire-sorry4ek" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">itspm.ag/esentire-sorry4ek</span><span class="invisible"></span></a></p><p>Thanks to eSentire for supporting the conversation and helping us explore where AI meets security in the real world.</p><p>Sean Martin, CISSP &amp; Marco Ciappelli<br>Co-Founders at ITSPmagazine</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/agenticAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>agenticAI</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/esentire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>esentire</span></a> <a href="https://infosec.exchange/tags/brandstory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>brandstory</span></a> <a href="https://infosec.exchange/tags/itspmagazine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itspmagazine</span></a> <a href="https://infosec.exchange/tags/securityoutcomes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityoutcomes</span></a> <a href="https://infosec.exchange/tags/securityoperations" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityoperations</span></a> <a href="https://infosec.exchange/tags/genai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>genai</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a> <a href="https://infosec.exchange/tags/aisecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aisecurity</span></a></p>
John Leonard<p>Passkey implementations by Google, Amazon, Microsoft vulnerable to AitM attacks, research</p><p>Attackers can proxy login pages, removing mention of passkeys and prompting users to resort to passwords, finds eSentire.</p><p><a href="https://www.computing.co.uk/news/4331630/passkey-implementations-google-amazon-microsoft-vulnerable-aitm-attacks-research" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">computing.co.uk/news/4331630/p</span><span class="invisible">asskey-implementations-google-amazon-microsoft-vulnerable-aitm-attacks-research</span></a></p><p><a href="https://mastodon.social/tags/technews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technews</span></a> <a href="https://mastodon.social/tags/aitm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aitm</span></a> <a href="https://mastodon.social/tags/mitm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mitm</span></a> <a href="https://mastodon.social/tags/passkey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passkey</span></a> <a href="https://mastodon.social/tags/yubikey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yubikey</span></a> <a href="https://mastodon.social/tags/esentire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>esentire</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Digital Human ✔<p>Hoe het #1 betrouwbare cybersecurity nieuwsplatform misleiding door adware aanpakt <a href="https://www.trendingtech.news/trending-news/2024/06/18226/hoe-het-1-betrouwbare-cybersecurity-nieuwsplatform-misleiding-door-adware-aanpakt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendingtech.news/trending-new</span><span class="invisible">s/2024/06/18226/hoe-het-1-betrouwbare-cybersecurity-nieuwsplatform-misleiding-door-adware-aanpakt</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> Nieuws <a href="https://mastodon.social/tags/Adware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Adware</span></a> Campagne <a href="https://mastodon.social/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a> Quest App <a href="https://mastodon.social/tags/SEO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SEO</span></a> vergiftiging <a href="https://mastodon.social/tags/eSentire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eSentire</span></a> Analyse <a href="https://mastodon.social/tags/Trending" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trending</span></a> <a href="https://mastodon.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://mastodon.social/tags/Nieuws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nieuws</span></a></p>