Level up your cyber security assessments with this framework
3:00:14
How AI was Stolen
51:44
Demo Days // Team GPS
26:22
How to Protect against Token Theft | Conditional Access
27:25
Getting started with email security in Microsoft 365 | Phishing protections
17:34
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
36:32
Manage Local Admin Accounts Securely | Top Tips
46:05
Phishing 2.0 - Detecting Evilginx, EvilnoVNC, Muraena and Modlishka
57:22