Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Don't Gamble with Golden SAML Dan Kaiser, Sally Vincent, and Jake Williams On December 8, 2020, FireEye announced that they had been the subject of a cybersecurity incident. Through their investigation, they discovered the SU... 2 years ago | 62 mins Többtényezős hitelesítés (MFA) Prekler Róbert Egy többtényezős hitelesítést biztosító megoldás kiválasztása nem egyszerű feladat. Számos megoldás nem nyújt elég rugalmasságot a jelenlegi és a jövő... 12 months ago | 65 mins Fast Track Your Office 365 Deployment and Beyond OneLogin Solutions Engineer Nathan and Chan Mustafa Ebadi, VP of IT & Services at SOTI Whether you’ve just purchased Office 365 or have been using it for a while, deploying and managing safe access to Office 365 is not simple, fast, or p... 7 years ago | 36 mins Dissecting the Golden SAML Attack Used by Attackers Exploiting SUNBURST Backdoor Randy Franklin Smith, Sally Vincent, and Dan Kaiser In this on-demand webinar, Randy Franklin Smith briefly introduces you to federation and SAML and how it works in Office 365. Then he will discuss how... 2 years ago | 95 mins Microsoft & Yubico: Enterprise Strong Authentication with YubiKey Nic Sarginson & Erik Parkkonen - Yubico // Tarek Dawoud & Aakashi Kapoor - Microsoft During this 2-hour briefing, we will take you through Microsoft’s passwordless journey and discuss methods of enabling strong authentication with Micr... 3 years ago | 78 mins Moving Laterally to the O365 Cloud Using a Domain Trust Modification Attack Nick Cavalancia, Dan Kaiser, Brian Coulson, and Sally Vincent The months following last December’s SolarWinds SUNBURST supply chain attack have brought forth plenty of intelligence around the tactics, techniques,... 2 years ago | 90 mins Change the Game With In-Document Analytics Vicky Lozovsky, Director of Market Strategy, Information Builders Summer Shorts Series Companies issue and distribute billions of PDF documents to employees, partners, and customers to provide them with vital inform... 7 years ago | 28 mins Внедрение многофакторной адаптивной аутентификации на основе рисков Дмитрий Войтышин Архитектор программных решений Micro Focus Украина Переход на адаптивную аутентификацию Используя механизм NetIQ Risk Service, у вас есть возможность использовать как статические, так и даже поведенчес... 2 years ago | 36 mins A Surprise Trip to Zero-Trust Land Wendy Nather, Head Advisory CISO, Duo Security at Cisco Protect your employees, devices and applications with simple, powerful access security. In this webinar you will learn how to: ● Provide an eas... 2 years ago | 13 mins Enterprise Cyber Risk: Not Fixed, But Managed Jacqui McNamara, Head of Cyber Security Services at Telstra: Mayukh Gon, a serial entrepreneur and founder of PerfectCloud Welcome to the NMG Media podcast series where we help bridge the communication gap between carriers and suppliers in the ICT sector. Today, we are jo... 5 years ago | 30 mins