Top Five Security Tips

1:10:42
PASSKEYS - What they are, why we want them and how to use them!

24:03
Aproveitando o Microsoft Defender para Identidade

17:34
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

13:48
How To Learn Any Skill So Fast It Feels Illegal

8:26
Best Antivirus vs Windows Defender: What's the difference?

39:13
FinOps and Azure! Understanding what FinOps is and why we care.

52:32
Protecting Against Credential and Token Theft

15:54