#Zerotrust
Microsoft MVP Brien Posey explains how tabletop exercises can turn a Zero Trust strategy into practical readiness. Learn how to test response plans, strengthen coordination, and close security gaps.

Read more: virtualizationreview.com/articles/202...

#Microsoft365 #ZeroTrust #CyberSecurity
Using Tabletop Exercises to Strengthen Microsoft 365 Zero Trust Preparedness -- Virtualization Review
Brien Posey showed how organizations can use tabletop exercises to test and strengthen their Microsoft 365 Zero Trust strategies through realistic, collaborative simulations that expose gaps before re...
virtualizationreview.com
November 14, 2025 at 3:23 PM
CISOs: Learn how to tackle unmanaged devices, compliance, and AI-powered threats.

Download here: deviceauthority.com/new-guide-to...

#IoTSecurity #CyberSecurity #MachineIdentity #ZeroTrust #Compliance #NIST #CRA #KeyScaler #DeviceSecurity #OTsecurity
New Guide to IoT/OT Visibility and Control - Device Authority
deviceauthority.com
November 12, 2025 at 12:33 PM
“True Zero Trust goes beyond MFA - it requires dynamic, contextual machine identity.”

Bert Kashyap, CEO & Co-Founder of SecureW2, on building passwordless trust through PKI, 802.1X, and automation.

#ZeroTrust #Passwordless #Cybersecurity #IdentitySecurity #SecureW2 #TechNadu
November 12, 2025 at 3:19 PM
👨‍🏫 Ready to move from “why” to “how” on geo filters in Entra Conditional Access?
🌍 I break down a practical, Zero Trust-friendly approach: block-by-default, named locations, and scoped exceptions for Scandinavian travelers.
#Entra #ZeroTrust agderinthe.cloud/2025/11/12/d...
Diving into geo filter with Entra Conditional Access – Part 2
So in part 1 I talked about the “why” of geo filter. Now let’s get a bit more technical and talk about the “how”. The foundation So first of all, I will explain briefl…
agderinthe.cloud
November 12, 2025 at 7:30 AM
Explain “Zero Trust” with a Simple short video. The video is in English and Thai.
.
#iamSK #ITPro #ITProfessional #ITNomad #DigitalNomad #InformationSecurity #Information #Security #InfoSec #ZeroTrust #ZeroTrustSecurity
.
November 8, 2025 at 3:51 PM
AI Ethics: The New Frontier for Public EA

AI is everywhere, but public EA faces unique ethical challenges. How do you embed ethics into architecture with sensitive citizen data? Are zero-trust frameworks part of your approach?

#EnterpriseArchitecture #AIethics #ZeroTrust #DigitalPublicService
November 6, 2025 at 9:01 AM
Industrial networks weren’t built for today’s threats. A single compromised device can move freely once it’s "inside."
Zero Trust changes the rules: identity, context and continuous checks, even inside the factory.

www.demystifyingindustrialtech.com/p/why-zero-t...

#ZeroTrust #ICS #Cybersecurity
November 2, 2025 at 2:41 PM
Your daily dose of hacking & defense. Check out today’s curated playlist for pros & learners alike. ⚡ https://rootshell.online
#Hacking #CyberDefense #ZeroTrust #CyberAwareness #Malware
251031 rootshell.online
Created on Fri Oct 31 11:00:00 CST 2025 - A news, tutorials and conferences about security published on YouTube - Find the RSS Feed with latest playlists at ...
rootshell.online
October 31, 2025 at 5:02 PM
🚀 RAG Databases 101: Build a Secure Knowledge Layer for AI in Microsoft 365
Watch now to see how to make your enterprise AI secure, smart, and scalable.
#RAG #Microsoft365 #AI #AzureAI #Copilot #AIDevelopment #EnterpriseAI #CloudSecurity #ZeroTrust #Technijian
October 30, 2025 at 2:01 PM
Vendor OAuth is the hidden backdoor most orgs ignore. Salesloft-Drift proves incident response without systemic change fails. Monitoring + token discipline must become standard.
#CyberSecurity #APIsecurity #OAuth #SupplyChainRisk #Infosec #CISO #ZeroTrust
Two Months After Salesloft-Drift: What We Know Now and What's Still Broken
Two months ago, attackers compromised one vendor and accessed 700+ Salesforce instances. By October 28, 2025, the crisis response is complete.
www.linkedin.com
October 29, 2025 at 5:20 PM
🔐 Secure Your Network with CyberPhore

Protect your business from evolving cyber threats with our advanced network security services.

👉 cyberphore.com/services/netw...

#NetworkSecurity #CyberSecurity #AI #ZeroTrust #CyberPhore
Network Security Services — 24/7 Managed Protection & Threat Detection
Secure your infrastructure with CyberPhore’s managed network security — real-time threat detection, firewall management, NAC, and anomaly detection.
cyberphore.com
October 29, 2025 at 5:00 AM
Just finished recording my polysecure.ca podcast episode with Nicolas-Loïc Fortin. Dropping later in November. Pull out your Duolingo and start that French track because we're dropping MCP/Zero Trust knowledge bombs in French. 👀🍿

#mcp #oauth #zerotrust #agenticai #security
October 24, 2025 at 1:22 PM
“Modern segmentation must move beyond static IPs,” says Piotr Kupisiewicz, CTO at Elisity.
He unpacks how consistency scoring and identity-based controls redefine Zero Trust.

#ZeroTrust #MicroSegmentation #Cybersecurity
October 24, 2025 at 9:16 AM
Securing data isn’t just about access, it’s about context.

In Part 3 of my Authentication Contexts series, I dive into real-world data protection with MDCA, SharePoint, and Sensitivity Labels.

Read the post:

www.chanceofsecurity.com/post/masteri...

#MSEntra #DataProtection #ZeroTrust
Mastering Microsoft Entra Authentication Contexts - Part 3: Advanced Data Protection
With identities and access strengthened in part 2, it’s time to turn our focus to real-world data protection with Authentication Contexts.One of the more underused capabilities of Authentication Conte...
www.chanceofsecurity.com
October 22, 2025 at 7:02 AM
🛰️ Government Moves on Post-Quantum
US agencies (Air Force, CISA, NIST) are actively preparing for post-quantum cyber defense. Post-quantum migration is no longer optional — it’s strategy. 🧑‍💻🛡️
#Quantum #Cybersecurity #PostQuantum #ZeroTrust
👉 federalnewsnetwork.com
October 16, 2025 at 3:44 PM
Valid account usage is the #1 access vector in identity threat reports per @talosintelligence.com: tinyurl.com/2twf98ry

Implementing #ZeroTrust has never been more important. Here are 3 book recs…

0️⃣ Hall of Famer 𝙕𝙚𝙧𝙤 𝙏𝙧𝙪𝙨𝙩 𝙉𝙚𝙩𝙬𝙤𝙧𝙠𝙨 by Evan Gilman and Doug Barth: tinyurl.com/3h5mnbyd

(1/2)...
October 17, 2025 at 12:12 AM
The Tailscale team will be at #AllThingsOpen next week! Stop by and see us on the 4th floor outside of the main stage. We are bringing tons of stickers, swag and friendly faces to discuss all things #zerotrust. 🔒 🚀 @allthingsopen.bsky.social
October 9, 2025 at 6:01 PM
Security Beyond the Perimeter

Tom Hollingsworth at Security Field Day highlighted that cloud-based users and data require modern, edge-focused security to protect networks and maintain productivity.

#TFDTakeaways #XFD14 #CyberSecurity #NetworkSecurity #CloudSecurity #ZeroTrust
October 6, 2025 at 9:52 PM
Today I'll show you how to achieve that by configuring Windows Defender Application Control, a.k.a. WDAC.

youtu.be/HKJJkSON1Kg

#intune #microsoft365 #zerotrust
Block apps from installing and launching with Intune: Get started with WDAC
YouTube video by Get Rubix
youtu.be
September 25, 2025 at 6:36 PM
Cloudflare will be sponsoring Swiss IT Forum(s) 2025 at Palexpo, Geneva, on October 1-2, 2025!

📍 Visit us at Booth IT 114 to discover how Cloudflare helps organizations stay secure, fast, and reliable in today's digital-first world.

👉 See you in Geneva!
#SwissITForum #Cybersecurity #ZeroTrust
September 25, 2025 at 9:28 AM
Exploring Zero Trust Architecture? Remember, it's about “Never Trust, Always Verify.” Key components: people, devices, networks, and applications. Stay tuned for more insights! #ZeroTrust #Cyber #CyberSecurity #InfoSec #DevSecOps #DataProtection
December 28, 2024 at 12:27 PM
2/ Total AI-Controlled Encryption: AI encrypts all data at rest, in transit, and in compute using self-evolving cryptographic schemes. No human or external AI can decrypt or intercept. 🔏 #Privacy #ZeroTrust #AIsecurity
February 25, 2025 at 10:14 PM