Ta spletna stran hrani piškotke, da bi vam zagotovili boljšo uporabniško izkušnjo in popolno funkcionalnost te strani.

Analitične piškotke uporabljamo s storitvijo Google Analytics, samo z vašo privolitvijo. Sprejemam Zavrnitev Več informacij

Urnik / Defender

Jasmin Azemović

Fortifying Software Projects: Neutralizing Security Incidents with Mitigation Steps

TECH
200 NSI
Miha Pihler

Microsoft Defender for Endpoint

TECH
300 HCL
Saša Kranjac

Your data in hands of Microsoft 365 Copilot

TECH
200 NSI
Nataša Klenovšek Arh

Share your bloody indicators!

TECH
100 NSI
Jakob Premrn

From Lures to Labyrinths: The Role of Deception in Modern Cyber Security

TECH
300 NSI
Jure Jereb

Do you PAW 2.0? Cloud edition

TECH, NETW
300 NSI
Nikola Begovic · Darko Vukovic

Securing the Future: Microsoft Copilot for Security & XDR Synergy

TECH
200 NSI
Jan Češčut · Matej Jagodic

Zaščita pred Adversary-in-the-Middle napadi: Kako se hitro in učinkovito izogniti neželenim posrednikom

TECH, NETW
300 NSI
Miha Pihler · Gregor Spagnolo

Varnostni incidenti na Slovenskem

TECH
200 SRV
Grzegorz Tworek

How I created 10 mln of viruses

TECH
200 NSI
Tomislav Poljak

Most common hacker techniques (MITRE ATT&CK) and safeguarding privileged identities

TECH
300 NSI
Tadej Bajc · Oliver Nikolić

Do more with Less! Microsoft Security.

TECH, NETW
200 NSI
Miha Pihler · Milan Gabor

Red vs Blue: Hekanje Microsoft PKI infrastrukture: Od gesel v svet certifikatov

TECH
300 NSI
Erik Blažica

Ali je Azure Arc prihodnost upravljanja on-premise okolja?

TECH, NETW
100 SRV
Nataša Klenovšek Arh

Is getting IOCs from malware analysis really that hard?

TECH
300 NSI
Milan Gabor

5 vstopnih točk v vašo domeno

TECH
300 NSI
Vlatko Ivanovski

Mastering DevOps Security with GitHub Advanced Security and Defender for DevOps

TECH
200 DOA