Tag Archives: Access Management
Protect against identity-based attacks.
Access ManagementActive Directoryadvanced huntingCloud SecurityConditional Access PoliciesCopilotCopilot for Securitycyber attackcyber securityIAMIdentity and Access Managementidentity based attacksIdentity Postureidentity securityIdentity threat detectionidentity threat detection and responseITDRMicrosoft Defender XDRMicrosoft EntraMicrosoft securityprivileged identitysecure score in microsoft defender for cloudthreat detectionXDR
One Identity e la gestione unificata delle identità
Access Managementactive rolesamApplication Securitycloudcyber gangCybersecuritygestione unificata identitàIAMIdentity & Access Managementidentity correlationidentity governance administrationidentity securityidentity sprawligajust-in-time privilegedmassimiliano micuccimicrosoft active directory managementone identitypampar-tecprivileged access managementproliferazione identitàRansomwareSaaSsafeguardunified identity platformzero trust
ITGC Basics
Access Managementapplication controlsbackup managementChange ManagementControlsdata recoveryincident managementInformation technology general controlsITGCITGC domainslogical accesspenetratingpenetrating testingphysical accessSDLCSecurity Incidentsystem development life cycleVAPTvulnerabilityVulnerability management
Sam, the IT Admin, Figures out Advanced Authentication
Access GovernancemAccess ManagementAdvanced Authenticationadvanced authentication frameworkBreachcard readerChallenge and ResponseCIOCredit Card DatafraudHackedID Badgeidentity theftIT SecurityMicro FocusmicrofocusMobile ComputingMobile WorkersMulti-Factor AuthentifactionMultifactor AuthenticationNetIQone-time-passwordpasswordsproximity cardsSecuritysmart cardsSmart PhonesSMS Passwordsunauthorized accessUsernames
Introducing privileged access management in Office 365
Access ManagementAdminadministratorapprovalapproveAudit'azure adCloud SecurityCybersecurityData SecuritydemodemonstrationguideHow toidamidentityinformation securityIT SecurityJITjust enough accessjust in timelockboxOffice 365privilegeprivileged accountsSecuritystep-by-steptasktutorialzero standing accesszero standing privilege
Recent Posts
- Lookup Transformation in Mapping Data Flow in Azure Data Factory | adf tutorial part 48
- ASP.NET Identity over REST: PART 1 – Preparation
- How to Debug Azure Functions in Azure Portal: Step-by-Step Guide
- Sharepoint: Upload a file in any specific subfolder of sharepoint online C# (CSOM)
- Microsoft Azure DP-900 Virtual Training Day: Data Fundamentals 2 / rus.subs / 2022