Sarah Cecchetti (@sarah_cecc) 's Twitter Profile
Sarah Cecchetti

@sarah_cecc

Head of Product, @Beyondidentity Founder, @IDPro_org. Contributor, @usnistgov Digital Identity Guidelines, @OReillyMedia. Yubikey earrings wearer.

ID: 5562662

calendar_today27-04-2007 18:41:36

2,2K Tweet

3,3K Followers

1,1K Following

Sarah Cecchetti (@sarah_cecc) 's Twitter Profile Photo

If you're near New York and you want to see what the next generation of identity tooling is going to look like, you should come to this one-day event! Great speakers and demos.

Sarah Cecchetti (@sarah_cecc) 's Twitter Profile Photo

We (Beyond Identity) have opened up early access to a new identity product! It’s called RealityCheck. Are you worried about Zoom deepfakes? Imagine if you could have a badge that connected your Zoom user to a passkey that’s bound to your employee’s identity and devices. It

We (<a href="/beyondidentity/">Beyond Identity</a>) have opened up early access to a new identity product! It’s called RealityCheck. Are you worried about Zoom deepfakes? Imagine if you could have a badge that connected your Zoom user to a passkey that’s bound to your employee’s identity and devices. It
Biometric Update (@biometricupdate) 's Twitter Profile Photo

Deepfakes are a lurking ghost, with many unaware of increasing risk Santander research shows low awareness as Beyond Identity, Veridas, Corsound raise alarm #biometrics #deepfakes Santander biometricupdate.com/202408/deepfak…

Sarah Cecchetti (@sarah_cecc) 's Twitter Profile Photo

Everyone else in these photos looks normal, while I appear to be in a wind tunnel distracted by a squirrel, and if that doesn't get you to click through, I don't know what will. 🤷‍♀️

Sarah Cecchetti (@sarah_cecc) 's Twitter Profile Photo

I deeply apologize on behalf of my entire industry. 😬 There are better solutions now, but it’s slow going to roll them out everywhere…

Sarah Cecchetti (@sarah_cecc) 's Twitter Profile Photo

I can't guarantee that the sun will rise in the East, but I can guarantee that your employees would rather being doing their jobs than attending endless cybersecurity trainings.

Sarah Cecchetti (@sarah_cecc) 's Twitter Profile Photo

I, a Seattleite, once traveled to Florida and ordered a tall drip with no room. They stared at me for a few seconds and said “you mean you want a cup of coffee?”

Sarah Cecchetti (@sarah_cecc) 's Twitter Profile Photo

Look, you CAN do auth, but believe me when I tell you it’s a bitch to maintain, and it’s more efficient for specialized companies to maintain fully secure multi-tenant implementations of their product than for every company to do that maintenance on their own.

Sarah Cecchetti (@sarah_cecc) 's Twitter Profile Photo

And I don’t just mean that auth lives high up the stack so you have to deal with a ton of dependencies (although that’s true) I mean any bureaucrat in the world can screw with their country’s SMS regulations, and blow up your roadmap for an entire quarter.

Sarah Cecchetti (@sarah_cecc) 's Twitter Profile Photo

RealityCheck is part of a larger strategy to link identity directly to hardware. In this demo, we can cryptographically validate the employee's hardware and indicate using a zoom plugin whether they are on their work laptop. Securing zoom with weak MFA is so 2023, you guys. 🤷‍♀️

Jake Williams (@malwarejake) 's Twitter Profile Photo

You don't need to do vishing and smishing "simulations" with your employees. Since we can all agree you're going to get victims (and they ARE being emotionally victimized, make no mistake about it), redirect that energy to hardening your defenses against the inevitable failures