Also @[email protected]
Searchable
[bridged from https://infosec.exchange/@deepthoughts10 on the fediverse by https://fed.brid.gy/ ]
I highly recommend that you use Conditional Access to block Device Code Flows for this reason and many others. If you have some users who need to use it, put them in a group and exclude them from the policy. Most users will never […]
I highly recommend that you use Conditional Access to block Device Code Flows for this reason and many others. If you have some users who need to use it, put them in a group and exclude them from the policy. Most users will never […]
I’d really like to say “these 8 are the worst people in tech — by far” and call it done
I’d really like to say “these 8 are the worst people in tech — by far” and call it done
As usual, Catalin has an excellent round up of recent #cybersecurity news
As usual, Catalin has an excellent round up of recent #cybersecurity news
This brings a really interesting prevention opportunity for businesses with web security proxies in place (Zscaler, Netskope, NGFW's, etc.) Enforce the use of TLS 1.2 or higher. This might be a big lift for some organizations, but for […]
This brings a really interesting prevention opportunity for businesses with web security proxies in place (Zscaler, Netskope, NGFW's, etc.) Enforce the use of TLS 1.2 or higher. This might be a big lift for some organizations, but for […]
Unless your org uses Bubble.io and their low-code developer platform, you can likely block their app-hosting domain bubbleapps.io. Put in an allow list for vetted BubbleApps URLs if you need to.
Also, I think this one is already […]
Unless your org uses Bubble.io and their low-code developer platform, you can likely block their app-hosting domain bubbleapps.io. Put in an allow list for vetted BubbleApps URLs if you need to.
Also, I think this one is already […]
Please submit your comments on this proposed change, which takes away an important method for challenging patents. This seems like a clear give-away to big business and patent troll firms. Let’s not let them slip this change in easily or quietly.
Please submit your comments on this proposed change, which takes away an important method for challenging patents. This seems like a clear give-away to big business and patent troll firms. Let’s not let them slip this change in easily or quietly.
The Google post that Andrew shared notes the updates made re: Gainsight & Salesforce:
Update (Nov. 21): In response to the Salesforce advisory related to Gainsight applications, this blog post has been updated to include comprehensive […]
The Google post that Andrew shared notes the updates made re: Gainsight & Salesforce:
Update (Nov. 21): In response to the Salesforce advisory related to Gainsight applications, this blog post has been updated to include comprehensive […]
New day, new scam — and AI makes these scammers more efficient. As Scalzi says, if someone sends you an unsolicited email asking for money, don’t send any.
New day, new scam — and AI makes these scammers more efficient. As Scalzi says, if someone sends you an unsolicited email asking for money, don’t send any.
Really cool. Hopefully this starts showing up at other conferences like @BSidesLV and @defcon
Really cool. Hopefully this starts showing up at other conferences like @BSidesLV and @defcon
Free #microsoft Identity training! #cybersecurity
Free #microsoft Identity training! #cybersecurity