Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Joseph Carson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Joseph Carson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Exploring Machine Identities in Cybersecurity with Evandro

40:00
 
Share
 

Manage episode 500091419 series 3666971
Content provided by Joseph Carson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Joseph Carson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode of the Security by Default podcast, Joseph Carson and Evandro Goncalves discuss the critical topic of machine identities also known as non-human identities (NHI), exploring their definitions, challenges, and best practices for management. They delve into the complexities of managing non-human identities in cybersecurity, emphasizing the importance of visibility, risk management, and the principle of least privilege.

The conversation also highlights experiences from the NATO Lock Shield event, showcasing the real-world implications of identity security. Evandro shares insights on staying updated in the cybersecurity field and the importance of hands-on learning.

Takeaways

  • The podcast aims to make security accessible to everyone.
  • Machine identities are non-interactive identities used in IT environments.
  • Organizations may have up to 80 machine identities for every human identity.
  • Visibility and management of machine identities are significant challenges.
  • Over-privileged accounts are a common issue in organizations.
  • Applying the principle of least privilege is crucial for security.
  • Communication and coordination are vital during cybersecurity events.
  • Hands-on experience and laboratories are effective for learning new technologies.
  • Staying updated with threat reports is essential for cybersecurity professionals.
  • Networking through platforms like LinkedIn is beneficial for knowledge sharing.

Keywords

machine identities, cybersecurity, identity security,

non-human identities, security management, best practices, NATO Lock Shield,

visibility, risk management, zero trust

  continue reading

8 episodes

Artwork
iconShare
 
Manage episode 500091419 series 3666971
Content provided by Joseph Carson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Joseph Carson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode of the Security by Default podcast, Joseph Carson and Evandro Goncalves discuss the critical topic of machine identities also known as non-human identities (NHI), exploring their definitions, challenges, and best practices for management. They delve into the complexities of managing non-human identities in cybersecurity, emphasizing the importance of visibility, risk management, and the principle of least privilege.

The conversation also highlights experiences from the NATO Lock Shield event, showcasing the real-world implications of identity security. Evandro shares insights on staying updated in the cybersecurity field and the importance of hands-on learning.

Takeaways

  • The podcast aims to make security accessible to everyone.
  • Machine identities are non-interactive identities used in IT environments.
  • Organizations may have up to 80 machine identities for every human identity.
  • Visibility and management of machine identities are significant challenges.
  • Over-privileged accounts are a common issue in organizations.
  • Applying the principle of least privilege is crucial for security.
  • Communication and coordination are vital during cybersecurity events.
  • Hands-on experience and laboratories are effective for learning new technologies.
  • Staying updated with threat reports is essential for cybersecurity professionals.
  • Networking through platforms like LinkedIn is beneficial for knowledge sharing.

Keywords

machine identities, cybersecurity, identity security,

non-human identities, security management, best practices, NATO Lock Shield,

visibility, risk management, zero trust

  continue reading

8 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play