Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
History
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/11/9b/56/119b5668-9517-eec8-03c3-d6b461d27d42/mza_7558889660544782488.jpg/600x600bb.jpg
The CyberCall Podcast
Andrew Morgan
26 episodes
3 months ago
This week, we’re diving into three huge shifts happening in the Microsoft ecosystem that every MSP should have on their radar: · Token Protection is now available for Entra ID P1 licenses — and it’s a game changer for securing identity tokens and stopping session hijacking. · GDAP — the move from legacy DAP to Granular Delegated Admin Privileges — is creating both confusion and opportunity for MSPs managing multiple tenants. · And fo...
Show more...
Technology
RSS
All content for The CyberCall Podcast is the property of Andrew Morgan and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
This week, we’re diving into three huge shifts happening in the Microsoft ecosystem that every MSP should have on their radar: · Token Protection is now available for Entra ID P1 licenses — and it’s a game changer for securing identity tokens and stopping session hijacking. · GDAP — the move from legacy DAP to Granular Delegated Admin Privileges — is creating both confusion and opportunity for MSPs managing multiple tenants. · And fo...
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/11/9b/56/119b5668-9517-eec8-03c3-d6b461d27d42/mza_7558889660544782488.jpg/600x600bb.jpg
CIS Control 6 - Access Control Management - sponsored by Appgate
The CyberCall Podcast
52 minutes
3 years ago
CIS Control 6 - Access Control Management - sponsored by Appgate
Abstract: It is easier for an external or internal threat actor to gain unauthorized access to assets or data through using valid user credentials than through "hacking" the environment. There are many ways to covertly obtain access to user accounts, including: week passwords, accounts still valid after a user leaves the organization, dormant or lingering test accounts, shared accounts that have not been changed in months or years, service accounts embedded in applications for scripts, ...
The CyberCall Podcast
This week, we’re diving into three huge shifts happening in the Microsoft ecosystem that every MSP should have on their radar: · Token Protection is now available for Entra ID P1 licenses — and it’s a game changer for securing identity tokens and stopping session hijacking. · GDAP — the move from legacy DAP to Granular Delegated Admin Privileges — is creating both confusion and opportunity for MSPs managing multiple tenants. · And fo...