Technical
Microsoft Entra ID: The Complete Guide to Conditional Access Policies
Here it is – everything you need to know about using Entra ID’s Conditional Access policies to boost your identity security posture. Microsoft Entra ID (formerly Azure Active Directory) is Microsoft’s cloud-based ...
Microsoft Entra ID: The Complete Guide to Conditional Access Policies
Get everything you need to know about using EntraID Conditional Access policies to boost your identity security posture. The post Microsoft Entra ID: The Complete Guide to Conditional Access Policies appeared first ...
A Guide to the Gartner IAM Summit in London
Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of Gartner’s ...
A Guide to the Gartner IAM Summit in London
Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of Gartner’s ...
How ITDR Could Have Helped Microsoft in the Midnight Blizzard Hack
Identity-based attacks are on the rise, but they can be prevented with the right identity threat detection and response (ITDR) measures. As winter crept in last year, so did identity threat actors ...
Top 10 Features to Enhance Your Okta Security Posture
We break down 10 key security configurations and features to ensure robust authentication and identity management within your Okta instance to help prevent future attacks. The post Top 10 Features to Enhance ...
What Automation has to do with AI and Cybersecurity
The post What Automation has to do with AI and Cybersecurity appeared first on AI Enabled Security Automation ...
The No-Code Fantasy: What Football Strategy Can Teach Us About Decision Making
The post The No-Code Fantasy: What Football Strategy Can Teach Us About Decision Making appeared first on AI Enabled Security Automation ...
No-Code Capabilities Cut Playbook Building in Half
The post No-Code Capabilities Cut Playbook Building in Half appeared first on AI Enabled Security Automation ...
GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol
What if you could no longer trust the critical process values displayed on your HMI screen? Executive Summary When operating […] ...