πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Access Management

Focus Area: πŸͺͺ Identity & Access Management
10
Total Entries
14
Contributors

Top Contributors

Ajay Bongirwar(1) Altaf Shaik(1) Ashwath Kumar(1) Bala Ramanan(1) Charanjit Bhatia(1)

All Entries (10 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2024-04-18TalkBlackhat Breaking Managed Identity Barriers In Azure Services Presentation Nitesh Surana, David Fiser#azure#cloud-pentesting#access-management+3
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Rana#cicd-security#devsecops#architecture+4
2023-05-12TalkBlackhat Abusing Azure Active Directory: From MFA Bypass to Listing Global Administrators Video Sravan Akkaram, Nestori Syynimaa#azure#identity-governance#access-management+1
2022-09-24TalkC0c0n Know Your Organization? : Mapping Entities in Google Workspace Manish Gupta, Yash Bharadwaj#gcp#identity-management#access-management+1
2022-09-06PanelNullcon PAM Maturity From Zero Trust To Least Privilege Video Ajay Bongirwar, Charanjit Bhatia, Bala Ramanan#security-strategy#zero-trust#access-management+2
2022-08-10TalkBlackhat Attacks From a New Front Door in 4G & 5G Mobile Networks Presentation Video Altaf Shaik, Shinjo Park, Matteo Strada#api-security#access-management#identity-theft+4
2022-04-08PanelNullcon Digital Identity In The Age Of Fintech Video Sheetal Joseph, Alessandro Avagliano, Guido Reismueller, Benoit Flippen, Travis Carelock#identity-management#access-management#authentication+4
2019-12-04TalkBlackhat Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing Presentation Whitepaper Video Karthik Ramasamy, Eric Hampshire#blueteam#smartcard#mfa+4
2017-03-03TalkNullcon Case Study on RFID (proximity cards) hacking Presentation Sarwar Jahan, Ashwath Kumar#rfid#red-teaming#hardware-embedded+4
2011-02-25TalkNullcon Protect infrastructure or protect information – Lessons from Wikileaks Presentation Vishal Gupta#data-leak#blueteam#data-protection+2