Nik Hewitt (@nikhewitt) 's Twitter Profile
Nik Hewitt

@nikhewitt

Media type and content shuffler. Armchair activist. Dog chauffeur. Cinema, art/design, XR, science, AI, TTRPGs, eclectica, and ephemera.

ID: 50943

linkhttp://www.nikhewitt.com calendar_today08-12-2006 16:35:19

27,27K Tweet

9,9K Followers

273 Following

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

Agentic AI feels magical until you realise you’ve handed an insomniac intern the master keys. The fix isn’t slowing agents down; it’s about keeping the speed while ditching the chaos. #agenticAI #AI #AIsecurity trustle.com/post/secure-ag…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

AWS over here. Azure, inherited via a merger. GCP doing its own thing. Multiple identity models and permission languages, a million ways to fail, and NIST doesn’t care. In all the chaos, how can we possibly comply? #cybersecurity #infosec #itsecurity trustle.com/post/nist-sp-8…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

Compliance isn’t hard because the controls are hard. It’s hard because the proof is a mess. Time to stop building audit scrapbooks and start continuously proving access. #cybersecurity #infosec #itsecurity trustle.com/post/security-…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

From security engineer to security leader: how to position yourself for that CISO promotion. #cybersecurity #infosec #itsecurity trustle.com/post/ciso-prom…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

Your devs have a new colleague who doesn’t follow the joiner–mover–leaver lifecycle. They don’t sleep, don’t take breaks, can open pull requests, query production logs, and are very easy to trick... #cybersecurity #infosec #itsecurity trustle.com/post/agentic-a…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

No deep integration = no least privilege. LP only works when JIT/CIEM/ILM lives inside HR, dev tools, SaaS, directories, and across cloud platforms. #cybersecurity #infosec #itsecurity trustle.com/post/ciem-inte…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

Rapid growth, organic or through acquisition, creates identity and entitlement (human and machine) sprawl across accounts, subscriptions, projects, and SaaS. How can controls catch up? #cybersecurity #infosec #itsecurity trustle.com/post/cloud-spr…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

We dive into ETSI EN 304 223, the EU standard that sets out how AI systems can operate in a trustworthy, accountable, and auditable way, and consider what it means for security teams. #agenticAI #AI #AIsecurity trustle.com/post/etsi-en-3…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

If we can’t prove who has access to what, right now, we’re carrying risk that’ll make auditors frown. How can we turn entitlement anarchy into audit-ready evidence, without slowing down the business? #cybersecurity #itsecurity #pcidss trustle.com/post/pci-dss

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

A popular one from our archive: The same core truth is the crux of all modern control standards. Access control is identity control. It’s about who can reach what, when, and how. #cybersecurity #infosec #itsecurity trustle.com/post/access-co…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

By bundling long-lived tokens and broad permissions into an autonomous agent, OpenClaw can turn “helpful automation” into a giant attack surface that can leak creds, exfiltrate data, and escalate breaches. #agenticAI #AI #AIsecurity trustle.com/post/openclaw-…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

Access approvals taking days? That’s yesterday’s problem. How can we slash friction, stop shadow access, and keep engineers in flow without waiting on tickets? #cybersecurity #infosec #itsecurity trustle.com/post/access-ap…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

Until #A2A agents didn’t speak the same language. Now they do, but what does this means for security teams? #cybersecurity #infosec #itsecurity trustle.com/post/a2a-secur…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

From security engineer to security leader: how to position yourself for that CISO promotion. #cybersecurity #infosec #itsecurity trustle.com/post/ciso-prom…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

Our access model was built for humans, not autonomous AI interns with god-mode. It just broke the rules. Time to rethink access before our bots become a breach. #cybersecurity #aisecurity #itsecurity trustle.com/post/agentic-a…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

Demonstrating a traceable record for SOC 2 compliance can be a pain, but it doesn’t have to be. We’ll make the pain go away in as little as 30 minutes. #itsecurity #soc2 #cybersecurity trustle.com/post/soc-2-com…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

#IAM best practices for small teams that don’t have time, money, or headcount. #cybersecurity #infosec #itsecurity trustle.com/post/iam-best-…

Trustle Security (@trustlesecurity) 's Twitter Profile Photo

We'll make all your identity and permissions estate issues go away in as little as 30 minutes. Secure agentic AI and nail ZSP. Piece of cake. 🍰 #cybersecurity #infosec #itsecurity trustle.com/post/trustle-f…