Security (53)

GCast 138: Granting Azure Active Directory Permissions to an Application Registration
GCast 137: Registering an Application with Azure Active Directory
GCast 136: Creating an Azure Active Directory User
Azure Identity Management with Microsoft Graph
Buck Woody on Database Security
Registering an Azure Account Subscription
Creating an Azure Active Directory B2C Tenant
Using the MS Graph API
Granting Azure Active Directory Permissions to an App Registration
Creating a JWT Bearer Token
Generating a Client Secret for an Azure Application
Creating a new Active Directory User
Simeon Kakpovi and Greg Schloemer on a Cybersecurity game
GCast 133: Configuring an Azure App Service Identity Provider
GCast 132: Managing Azure Key Vault Secrets from a .NET App
GCast 131: Managing Secrets in an Azure Key Vault
Configuring an Identity Provider in an Azure App Service
James McKee on Application Security vs Developer Security
Registering an Application in Azure AD
Shannon Kuehn on Workload Identity Federation
Tudor Damian on Pandemics and Security
GCast 116: Azure Active Directory B2C Token Generation With No User Interaction
GCast 115: Registering an Azure Account Subscription
Tudor Damian on Cybersecurity and Ethical Hacking
GCast 114: Creating an Azure Active Directory B2C Tenant
Wolfgang Goerlich on Cyber Security Design Principles
Dave Hoerster on Azure Active Directory B2C
Christos Matskas on Microsoft Identity Platform
Kevin Pilch on gRPC
Enabling Downloads in Internet Explorer 11
Ondrej Balas on 2-Factor Authentication
Jayson Street on Patching Humans
Tobiasz Koprowski on Securing SQL Server
Raffaele Rialdi on GDPR
Aaron Lerch on Hacking for Good
Douglas Crockford on the Seif Project
Bridget Kromhout on CloudFoundry
Kevin Remde on Security and Windows 10
Kassandra Perch on Auth0
Jayson Street on Security Threats
Brian Lewis on Security Threats
“Stuck in Traffic” videos provide brief riffs on IT Security
Paula Januszkiewicz on The Human Side of Security
Michael Perry on Cryptography Ghost Stories
Rob Gillen on Security for Developers
Wolfgang Goerlich on Security Development Lifecycle
Tudor Damian on Application Security Threats
Joe Kuemerle on Reverse Engineering Applications
Josh Harrison on Azure Access Control service
A Parable About Claims
Vittorio Bertocci on WIF
Troy Hunt on ASP.NET Security
Bill Sempf on Security