Top Five Security Tips
![](https://i.ytimg.com/vi/Rzt30uytQs4/mqdefault.jpg)
13:03
What is Phishing Resistant Authentication
![](https://i.ytimg.com/vi/09zXZcNPLuU/mqdefault.jpg)
24:03
Aproveitando o Microsoft Defender para Identidade
![](https://i.ytimg.com/vi/rC1TV0_sIrM/mqdefault.jpg)
48:40
Microsoft Azure Managed Identity Deep Dive
![](https://i.ytimg.com/vi/RWcXKQcwBRY/mqdefault.jpg)
1:10:42
PASSKEYS - What they are, why we want them and how to use them!
![](https://i.ytimg.com/vi/yTMRGERZrQE/mqdefault.jpg)
10:11
Jim Keller: Arm vs x86 vs RISC-V - Does it Matter?
![](https://i.ytimg.com/vi/jq_LZ1RFPfU/mqdefault.jpg)
17:34
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
![](https://i.ytimg.com/vi/x5Tubc5Qrx8/mqdefault.jpg)
15:34
Azure Update - 7th February 2025
![](https://i.ytimg.com/vi/vTjasx3ahjM/mqdefault.jpg)
34:39