Cybersecurity | Cloud | DevelopmentDEF CON 31 – Azure B2C 0Day – An Exploit Chain from Public Keys to Microsoft Bug Bounty – John Novak January 5, 2025 video CONconference speakersDEFDEF CONDEFCONhacker conferencehackershackinghacking videosinformation securityinformation security conferencesecurity conferencesecurity research
Cybersecurity | Cloud | DevelopmentClearing Up Elements of Cloud Security | Ep 24 January 3, 2025 video Enterprise Securityinformation securityInfosecIT SecurityNetwork SecuritySecurityTripwire
Cybersecurity | Cloud | DevelopmentNo Integrity, No Trust. The Foundation of Zero Trust Architecture | Ep 26 January 2, 2025 video Enterprise Securityinformation securityInfosecIT SecurityNetwork SecuritySecurityTripwire
Cybersecurity | Cloud | Development10 Quick Tips to Improving Your Board's Cyber Security Literacy December 3, 2024 video Board Of Directors (Job Title)Cybersecuritycybersecurity literacyEnterprise Securityinformation securityInfosecIT SecurityNetwork SecuritySecurityTripwire
Cybersecurity | Cloud | DevelopmentThe Role of the ICT Professional in Information Security (CSCAN | PlymUniInfoSec) November 10, 2024 video computer securityHAISAinformation securityInfosecKeynoteLeon StrousPlymouth UniversityPlymUniPlymUniInfoSecSecurity
Cybersecurity | Cloud | DevelopmentAdapt or Die: The Evolution of Endpoint Security November 5, 2024 video Enterprise Securityinformation securityInfosecIT SecurityNetwork SecuritySecurityTripwire
Cybersecurity | Cloud | DevelopmentBSidesIA 2017 Track1: Continuous Integration: Stalking Vulns with Puma Scan – Eric Johnson October 25, 2024 video BSidesBSides IowaBSidesIAContinuous integrationDevopshackersinformation securityInfosecvulnerabilitiesvulns
Cybersecurity | Cloud | DevelopmentNetIQ ChalkTalk: Does Your Company Want to Move to the Cloud? October 3, 2024 video cloudCloud AccessCloud ComputingCloud Securitycloud servicesComplianceCompliance MandatesData SecurityIdentity and Access Managementinformation securityIT SecurityMicro FocusmicrofocusMobile ComputingNetIQPCI DSSuser access
Cybersecurity | Cloud | DevelopmentDEF CON 29 – Sagi Sheinfeld, Eyal Karni, Yaron Zinar – Using M(achine)ITM to Attack Active Directory September 16, 2024 video Active DirectoryCONconference speakersDC29DEFDEF CONDEF CON 2021DEF CON 29DEFCONEyal karnihacker conferencehackershackinghacking videosinformation securityinformation security conferenceMITMsagi sheinfeldsecurity conferencesecurity researchYaron Zinar
Cybersecurity | Cloud | DevelopmentLet’s Play/Hack: Grey Hack, Part 1 August 29, 2024 video attackscceCISSPcomputer criminologycomputer examinercomputer forensicscomputer lawcomputer securitycrimecriminologyctfcyber-sociologyCybersecuritycybsecDigital Forensicsdigital profilingethical hackingforensicsfree coursegamingghidraHackedhackerhackingHackshydraiconographyinformation assuranceinformation securitylet's hacklet's playlet's play/hackmimikatznvstgtoffensive securitySecurityseriesstylometryUniversityUWSPWireshark