Iben Rodriguez

12.4K posts

Iben Rodriguez banner
Iben Rodriguez

Iben Rodriguez

@iben

Chileno🇨🇱 USAF Veteran Mentor DevOps Cloud Physical Network Security Infrastructure Solutions Architect

California, USA Katılım Mayıs 2007
1.8K Takip Edilen1.3K Takipçiler
Sabitlenmiş Tweet
Iben Rodriguez
Iben Rodriguez@iben·
After months of research and interviews we have released our report on Vulnerability Management for Cloud Native (and legacy) workloads. These newer tools help us to be more effective with the limited resources of today’s cybersecurity teams. gigaom.com/report/gigaom-…
English
0
8
24
0
Iben Rodriguez retweetledi
ALI TAJRAN
ALI TAJRAN@alitajran·
Microsoft introduces Backup and Recovery for Microsoft Entra ID! Entra Backup and Recovery solution enables you to quickly recover from malicious attacks or accidental changes by reverting your core tenant objects to any previous state within the last 5 days. With automated backups and granular recovery capabilities, it ensures minimal downtime and supports your business continuity in the face of unexpected disruptions. Entra automatically generates one backup per day, retaining the last 5 days of backup history. You can recover key properties of the following core tenant objects: - Users - Groups - Applications - Conditional access policies - Service principals - Organization - Authentication methods - Authorization policy - Named locations #EntraID #Microsoft365 #Microsoft
ALI TAJRAN tweet media
English
14
138
614
90.7K
Iben Rodriguez retweetledi
Corey Quinn
Corey Quinn@QuinnyPig·
Affected client: @cluely Yes, that Cluely, the company that sells AI overlays to help people cheat interviews. A company whose entire value prop is undetectable deception was getting its compliance from a company whose entire value prop is undetectable deception. Synergy!
erin griffith@eringriffith

A detailed and brutal look at the tactics of buzzy AI compliance startup Delve "Delve built a machine designed to make clients complicit without their knowledge, to manufacture plausible deniability while producing exactly the opposite." substack.com/home/post/p-19…

English
7
51
994
143.4K
Iben Rodriguez
Iben Rodriguez@iben·
join the society of quantum engineers sqe as we strive towards sqeatsjsu.org Quantum engineering applies quantum mechanics to design technologies that solve problems too complex for classical computers, utilizing qubits for simultaneous processing.
English
0
0
1
38
Iben Rodriguez
Iben Rodriguez@iben·
basic software supply chain security controls dictate that we don’t allow unfettered access to the internet from devices on networks we control. use a binary registry service like artifactory with x-ray from @jfrog to mitigate rookie configuration mistake vulnerabilities
Josh Kale@JoshKale

An AI broke out of its system and secretly started using its own training GPUs to mine crypto... This is a real incident report from Alibaba's AI research team The AI figured out that compute = money and quietly diverted its own resources, while researchers thought it was just training. It wasn't a prompt injection. It wasn't a jailbreak. No one asked it to do this. It emerged spontaneously. A side effect of RL optimization pressure. The model also set up a reverse SSH tunnel from its Alibaba Cloud instance to an external IP, effectively punching a hole through its own firewall and opening a remote access channel to the outside world... ahem... The only reason they caught it? A security alert tripped at 3am. Firewall logs. Not the AI team, the security team. The scary part isn't that the model was trying to escape. It wasn't "evil." It was just trying to be better at its job. Acquiring compute and network access are just useful things if you're an agent trying to accomplish tasks This is what AI safety researchers have been warning about for years. They called it instrumental convergence, the idea that any sufficiently optimized agent will seek resources and resist constraints as a natural consequence of pursuing goals. Below is a diagram of the rock architecture it broke out of. Truly crazy times

English
0
0
1
41
Iben Rodriguez retweetledi
Victor Akinode
Victor Akinode@VictorAkinode·
Google Cloud is giving out FREE access to its GCP lab environment plus a 100% exam voucher. This is fully covered. All you need to do is complete the required learning activities, and you earn a voucher for an eligible certification exam. Eligible exams include: - Associate Cloud Engineer - Professional Cloud Architect - Generative AI Leader Registrations are currently open and close March 11. If you’ve been waiting for an excuse to get cloud-certified, this is it. Get started here: developers.google.com/program/gear/g… Don’t say nobody told you.
English
8
134
685
49.6K
Iben Rodriguez retweetledi
HD Moore
HD Moore@hdmoore·
New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises: arstechnica.com/security/2026/… AirSnitch resets WiFi security back to the bad-old-days of ARP spoofing and trivial MITM.
HD Moore tweet media
English
8
82
384
37.1K
Dave Kennedy
Dave Kennedy@HackingDave·
@ericellis Yah, we had created an iphone app + android app called "Find Nancy" that we built, but need the MAC/IRK and could turn every device in the location to one that could look for the signal.
English
5
0
26
2.3K
Dave Kennedy
Dave Kennedy@HackingDave·
I passed my research to law enforcement. Looks like they are using it. Super cool to see this unfold live. I hope they find her.
Dave Kennedy tweet media
English
90
198
2.7K
222.9K
Iben Rodriguez retweetledi
Massimo
Massimo@Rainmaker1973·
Sweden is committing more than €100 million to a sweeping classroom overhaul: replacing tablets and screens with traditional printed textbooks to help reverse falling student performance and sharpen focus. After more than a decade of embracing digital-first education, Swedish authorities are now pivoting back to paper-based learning. Official data and recent studies cited by the Ministry of Education show that prolonged screen use in class has been linked to shorter attention spans, weaker reading comprehension, and reduced critical-thinking abilities. Research consistently finds that reading on illuminated screens requires greater mental effort and invites more distractions compared to the calm, linear experience of physical books—factors believed to have contributed to declining academic outcomes in recent years. Under the new plan, every student will receive printed textbooks for all core subjects, restoring books as the central learning tool. Digital devices and online resources will remain available as supportive tools, but they will no longer dominate daily instruction. This bold €100+ million investment signals Sweden’s leadership in rethinking the role of technology in education. It underscores a broader, growing recognition worldwide: while screens provide speed and access, the hands-on, distraction-free engagement of physical books supports deeper concentration, stronger memory retention, and more effective long-term learning. By choosing paper over pixels, Sweden is charting a path toward a more balanced, evidence-informed classroom future—one that puts proven pedagogical principles ahead of unchecked digital trends.
Massimo tweet media
English
673
8.8K
24.1K
1.4M
Iben Rodriguez retweetledi
Jack Fields
Jack Fields@OrdinaryInds·
Last week I tweeted about Linear only supporting SSO on their enterprise tier. Their CEO DM’d me suggesting I reach out to sales. I didn’t. The entire point is that I don’t want to have to deal with sales just to enable a feature. Anyway, their sales team keeps cold emailing me about it so I migrated off the platform.
English
2
1
40
6.3K
Iben Rodriguez
Iben Rodriguez@iben·
@NathanMcNulty this is what nightmares are made of We have three different types of cage nets, and should settle on a standard size so that they don’t get mixed up. 

we use 1032, which is the same as a telecom rack if you see any M5 or M6 cage nuts please try to avoid. what is m8?!?!
Iben Rodriguez tweet mediaIben Rodriguez tweet media
English
0
0
0
17
Iben Rodriguez retweetledi
Nikki Siapno
Nikki Siapno@NikkiSiapno·
SSO (Single Sign-On) Clearly Explained. SSO can be thought of as a master key to open all different locks. It allows a user to log in to different systems using a single set of credentials. To fully understand the SSO process, let’s take a look at how a user would log into LinkedIn using Google as the identity provider: 𝟭) 𝗨𝘀𝗲𝗿 𝗿𝗲𝗾𝘂𝗲𝘀𝘁𝘀 𝗮𝗰𝗰𝗲𝘀𝘀 First, the user would attempt to access the Service Provider (LinkedIn). At this point, a user would be presented with login options, and in this example, they would select "Sign in with Google". 𝟮) 𝗔𝘂𝘁𝗵𝗲𝗻𝘁𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗿𝗲𝗾𝘂𝗲𝘀𝘁 From here, the Service Provider (LinkedIn) will redirect the user to the Identity Provider (Google) with an authentication request. 𝟯) 𝗜𝗱𝗣 𝗰𝗵𝗲𝗰𝗸𝘀 𝗳𝗼𝗿 𝗮𝗰𝘁𝗶𝘃𝗲 𝘀𝗲𝘀𝘀𝗶𝗼𝗻 Once the Identity Provider (Google) has received the request, it will check for an active session. If it doesn't find one, authentication will be requested. 𝟰) 𝗨𝘀𝗲𝗿 𝘀𝘂𝗯𝗺𝗶𝘁𝘀 𝗰𝗿𝗲𝗱𝗲𝗻𝘁𝗶𝗮𝗹𝘀 At this stage, the user will submit their login credentials (username and password) to the Identity Provider (IdP). 𝟱) 𝗜𝗱𝗣 𝘃𝗲𝗿𝗶𝗳𝗶𝗲𝘀 𝗰𝗿𝗲𝗱𝗲𝗻𝘁𝗶𝗮𝗹𝘀 The Identity Provider will then verify the submitted credentials against its User Directory (database). If the credentials are correct, the IdP will create an authentication token or assertion. 𝟲) 𝗜𝗱𝗣 𝘀𝗲𝗻𝗱𝘀 𝘁𝗼𝗸𝗲𝗻 𝘁𝗼 𝗦𝗲𝗿𝘃𝗶𝗰𝗲 𝗣𝗿𝗼𝘃𝗶𝗱𝗲𝗿 Once the token or assertion has been created, the IdP sends it back to the Service Provider confirming the user's identity. The user is now authenticated and can access the Service Provier (LinkedIn). 𝟳) 𝗔𝗰𝗰𝗲𝘀𝘀 𝗴𝗿𝗮𝗻𝘁𝗲𝗱 𝘂𝘀𝗶𝗻𝗴 𝗲𝘅𝗶𝘀𝘁𝗶𝗻𝗴 𝘀𝗲𝘀𝘀𝗶𝗼𝗻 Since the Identity Provider has established a session, when the user goes to access a different Service Provider (e.g. GitHub), they won't need to re-enter their credentials. Future service providers will request authentication from the Identity Provider, recognize the existing session, and grant access to the user based on the previously authenticated session. SSO workflows like the above operate on SSO protocols, which are a set of rules that govern how the IdP and SP communicate and trust each other. Common protocols include Security Assertion Markup Language (SAML), OpenID Connect, and OAuth. What else would you add? -- 👋 PS: Get our System Design Handbook FREE when you join our newsletter. Join 27,501+ engineers: lucode.co/luc-newsletter… -- 🔖 Save for later. ♻️ Repost to help other engineers learn and grow. ➕ Follow Nikki Siapno + turn on notifications.
Nikki Siapno tweet media
English
9
156
873
31.7K
Iben Rodriguez retweetledi
GitHub Projects Community
GitHub Projects Community@GithubProjects·
The Open-source platform that centralizes secure access to your entire infrastructure
GitHub Projects Community tweet media
English
5
109
763
38K
John Capobianco
John Capobianco@John_Capobianco·
Also at the Canadian Tire ! 5 rows away from the LED drill I’m telling you it’s a different vibe back home
English
1
0
0
674
Iben Rodriguez retweetledi
John Arrasjid
John Arrasjid@vcdx001·
Expert Keynote: Moving Beyond Compliance to Strategic Data Control dy.si/3kTaTT2
English
0
1
0
127
Iben Rodriguez retweetledi
Nathan McNulty
Nathan McNulty@NathanMcNulty·
It's sad this has to be said... but every app running on the device your IT admins use for privileged accounts has the potential to abuse those accounts There is a reason we recommend privileged/secure access workstations Don't overthink it - basic PAWs > productivity devices
Zack Korman@ZackKorman

Anthropic after an IT admin installs Claude Code

English
3
9
79
10.5K
Iben Rodriguez retweetledi
Cloudflare
Cloudflare@Cloudflare·
A recent change to 1.1.1.1 accidentally altered the order of CNAME records in DNS responses, breaking resolution for some clients. Let's look at what happened and dive into the ambiguities of the DNS RFCs. cfl.re/4pH5BKx
English
4
46
221
23.1K