Ta spletna stran hrani piškotke, da bi vam zagotovili boljšo uporabniško izkušnjo in popolno funkcionalnost te strani.

Analitične piškotke uporabljamo s storitvijo Google Analytics, samo z vašo privolitvijo. Sprejemam Zavrnitev Več informacij

Urnik / Omrežja, varnost in identitete

Paula Januszkiewicz

Hacker’s Perspective on New Risks: Revising the Cybersecurity Priorities for 2024

TECH
100 NSI
Jasmin Azemović

Fortifying Software Projects: Neutralizing Security Incidents with Mitigation Steps

TECH
200 NSI
Jernej Porenta

Introduction to Linux security

TECH
200 NSI
Paula Januszkiewicz

DPAPI and DPAPI-NG: Decrypting All Users’ Secrets and PFX Passwords

TECH
100 NSI
Sander Berkouwer

You can't do Zero Trust with AD FS. Here's how to leave it behind..

TECH
300 NSI
Ljubo Brodarić

Microsoft Sentinel - pay less and stay secure

TECH
300 NSI
Žiga Humar

Sezona lova na zlobce (2. del)

TECH
200 NSI
Matej Klemenčič

Učinkovito upravljanje privilegiranih dostopov z Microsoft Entra PIM

TECH, NETW
300 NSI
Mustafa Toroman

Ten things you need to do to build rock solid Azure tenant

TECH
200 NSI
Tomislav Fučkar

Need safe access to the internet? Don't want to use 3rd party solutions? Microsoft Entra Internet Access is here!

TECH
300 NSI
Hrvoje Kusulja

Forensic evidence for insider risk

TECH
300 NSI
Saša Kranjac

Your data in hands of Microsoft 365 Copilot

TECH
200 NSI
Nataša Klenovšek Arh

Share your bloody indicators!

TECH
100 NSI
Žan Urbančič · Dalibor Vukovič

Praktična predstavitev naprednih tehnik (etičnega) vdiranja v IKT-sisteme

TECH, NETW
300 NSI
Jakob Premrn

From Lures to Labyrinths: The Role of Deception in Modern Cyber Security

TECH
300 NSI
Damir Dizdarevic

Microsoft Copilot for Security - what's up and what's down

TECH
300 NSI
Tomislav Fučkar

Forget old-fashioned VPN! Microsoft Entra Private Access is here!

TECH
300 NSI
Jure Jereb

Do you PAW 2.0? Cloud edition

TECH, NETW
300 NSI
Primož Bratanič

Dogodivščine v svetu slovenske informatike

TECH
400 NSI
Radek Rafinski

Every ID is privileged ID

TECH, NETW
100 NSI
Nikola Begovic · Darko Vukovic

Securing the Future: Microsoft Copilot for Security & XDR Synergy

TECH
200 NSI
Miloš Krunić

The Phishkeeper Protocol

TECH
200 NSI
Jan Češčut · Matej Jagodic

Zaščita pred Adversary-in-the-Middle napadi: Kako se hitro in učinkovito izogniti neželenim posrednikom

TECH, NETW
300 NSI
Aljaž Perovšek

Global Secure Access – Konec ere klasičnih VPN dostopov

TECH, NETW
200 NSI
Vladimir Stefanović

Mastering Azure Network for Modern Cloud Architectures

TECH
300 NSI
Aleksandar Nikolić

Meet Microsoft Entra PowerShell

TECH
200 NSI
Matej Klemenčič

Varnost na robu omrežja z Microsoft Entra Global Secure Access

TECH, NETW
300 NSI
Grzegorz Tworek

How I created 10 mln of viruses

TECH
200 NSI
Miha Pihler · Milan Gabor · Gregor Spagnolo · Boštjan Kežmah · Tadej Hren · Uroš Svete

Panelna razprava na temo informacijske varnosti

TECH
200 NSI
Aleksandar Nikolić

Practical Tips for Microsoft Graph PowerShell Users

TECH
300 NSI
Tomislav Poljak

Most common hacker techniques (MITRE ATT&CK) and safeguarding privileged identities

TECH
300 NSI
Andrej Golob

Je MFA res dovolj?

TECH
300 NSI
Tadej Bajc · Oliver Nikolić

Do more with Less! Microsoft Security.

TECH, NETW
200 NSI
Anja Ostovršnik

Prompt injection 101

TECH
200 NSI
Marko Ostanek

Digitalna varnost in ugled: Kako zaščititi svoje poslovanje v oblaku

TECH, NETW
200 NSI
Miha Pihler · Milan Gabor

Red vs Blue: Hekanje Microsoft PKI infrastrukture: Od gesel v svet certifikatov

TECH
300 NSI
Gregor Spagnolo

Odziv na incident/e

TECH
100 NSI
Nataša Klenovšek Arh

Is getting IOCs from malware analysis really that hard?

TECH
300 NSI
Sander Berkouwer

Five Do's and Don'ts for your Entra ID!

TECH
200 NSI
Milan Gabor

5 vstopnih točk v vašo domeno

TECH
300 NSI