Look for any podcast host, guest or anyone
Showing episodes and shows of

SSO

Shows

Enterprise Security Weekly (Audio)Enterprise Security Weekly (Audio)The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organizations expect. Talk about the critical weaknesses in traditional SSO implementations, how shadow IT thrives under the radar, and why enterprises continue to experience data breaches despite security investments. Can cover real-world examples of security failures, highlight the role of human behavior in risk, an...2025-06-301h 52Security Weekly Podcast Network (Audio)Security Weekly Podcast Network (Audio)The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organizations expect. Talk about the critical weaknesses in traditional SSO implementations, how shadow IT thrives under the radar, and why enterprises continue to experience data breaches despite security investments. Can cover real-world examples of security failures, highlight the role of human behavior in risk, an...2025-06-301h 52Enterprise Security Weekly (Video)Enterprise Security Weekly (Video)The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organizations expect. Talk about the critical weaknesses in traditional SSO implementations, how shadow IT thrives under the radar, and why enterprises continue to experience data breaches despite security investments. Can cover real-world examples of security failures, highlight the role of human behavior in risk, an...2025-06-301h 52Marie’s WeltMarie’s WeltEpisode 10: SSO mit ErdbeereMeine Schwester ist zu Gast und stellt ihre SSO Pferde im Podcast vor. Ihr SSO-Name ist übrigens "Kaya Strawberry Star".2025-06-2107 minCertified: The Security+ PrepcastCertified: The Security+ PrepcastSingle Sign-On (SSO) and Protocols (Domain 4)Single Sign-On (SSO) allows users to access multiple systems with a single set of credentials, enhancing both convenience and security when implemented with care. In this episode, we explain how SSO functions by relying on a centralized identity provider that issues authentication tokens to various applications, removing the need for users to log in repeatedly. We explore the protocols that power SSO, including Security Assertion Markup Language (SAML), OAuth 2.0, and OpenID Connect, and how each supports different use cases like web-based applications, APIs, or mobile authentication. While SSO reduces the burden of managing passwords, it also introduces risk—if th...2025-06-1609 minUBCNews - BusinessUBCNews - BusinessThis IAM Consultant Offers MFA/SSO Solutions for Banks & Financial InstitutionsWhen we discuss data breaches or hackers, we might get hung up on this image of a strange person sitting in a dark basement, their face illuminated from below by a cluster of monitors as they execute some dastardly scheme. However, if that were ever accurate, it certainly isn't anymore. These data thieves are well-funded, highly trained, and highly capable of breaching even the most secure password-protected systems. To put things in perspective, the largest private equity firm in America manages roughly $1 trillion in assets. Data breaches are expected to incur a total cost per year of...2025-05-0703 min24CAST | O maior podcast sobre Bitrix24 | CRMThink24CAST | O maior podcast sobre Bitrix24 | CRMThink#294 Login único (SSO) e Active Directory no Bitrix24Neste episódio do 24Cast, conversamos com Samuel, da SoftExpert, sobre como implementar o login único (Single Sign-On - SSO) com Microsoft Active Directory na versão Enterprise do Bitrix24. Ele compartilha experiências práticas e dicas valiosas sobre governança, segurança da informação, produtividade e gestão de acessos em empresas com mais de 250 usuários. Se você trabalha com infraestrutura de TI, ou gestão de sistemas corporativos, esse papo é pra você!  Tópicos que abordamos: O que é e como funciona o Microsoft Active Directory; Integração com o Bitrix24 Enterpris...2025-04-0429 minSurgOnc Today®SurgOnc Today®Live at SSO 2025: Society of Surgical Oncology International Committee presents: the International Career Development Exchange ProgramThe International Career Development Exchange (ICDE) program provides support for up-and-coming, early career surgical oncologists with leadership potential to receive one-on-one mentoring and engagement with a distinguished senior SSO member. SSO supports a participant from each of our 15 Global Partner Societies, plus two SSO member participants from countries not connected to one of our Global Partners. Participants receive complimentary registration for the SSO annual meeting and the opportunity to participate in a minimum one-week clinical observership at a US-based SSO member’s institution. Each participant is paired with an SSO Member Mentor with the goal th...2025-04-0415 minChaos Computer Club - recent audio-only feedChaos Computer Club - recent audio-only feedOMG WTF SSO - A beginner's guide to SSO (mis)configuration (38c3)A couple years ago I knew basically nothing about Single Sign-On but now I'm talking at 38c3 about it! Come find out how you too can go from beginner to the question-asker who protects your hackerspace/company/etc. from bad SSO implementations. Single Sign-On (SSO) is sold as a way to • centralize managing your organization’s users, • make life easier for your colleagues, and • enforce consistent security standards. But SSO protocols are just ways for an identity provider to share information about an authenticated identity with another service. Me having a way to tell my vendor “yeah, that’s Bob” doesn’t tell m...2024-12-3042 minChaos Computer Club - recent events feed (high quality)Chaos Computer Club - recent events feed (high quality)OMG WTF SSO - A beginner's guide to SSO (mis)configuration (38c3)A couple years ago I knew basically nothing about Single Sign-On but now I'm talking at 38c3 about it! Come find out how you too can go from beginner to the question-asker who protects your hackerspace/company/etc. from bad SSO implementations. Single Sign-On (SSO) is sold as a way to • centralize managing your organization’s users, • make life easier for your colleagues, and • enforce consistent security standards. But SSO protocols are just ways for an identity provider to share information about an authenticated identity with another service. Me having a way to tell my vendor “yeah, that’s Bob” doesn’t tell m...2024-12-3042 minChaos Computer Club - recent events feed (low quality)Chaos Computer Club - recent events feed (low quality)OMG WTF SSO - A beginner's guide to SSO (mis)configuration (38c3)A couple years ago I knew basically nothing about Single Sign-On but now I'm talking at 38c3 about it! Come find out how you too can go from beginner to the question-asker who protects your hackerspace/company/etc. from bad SSO implementations. Single Sign-On (SSO) is sold as a way to • centralize managing your organization’s users, • make life easier for your colleagues, and • enforce consistent security standards. But SSO protocols are just ways for an identity provider to share information about an authenticated identity with another service. Me having a way to tell my vendor “yeah, that’s Bob” doesn’t tell m...2024-12-3042 minChaos Computer Club - recent events feedChaos Computer Club - recent events feedOMG WTF SSO - A beginner's guide to SSO (mis)configuration (38c3)A couple years ago I knew basically nothing about Single Sign-On but now I'm talking at 38c3 about it! Come find out how you too can go from beginner to the question-asker who protects your hackerspace/company/etc. from bad SSO implementations. Single Sign-On (SSO) is sold as a way to • centralize managing your organization’s users, • make life easier for your colleagues, and • enforce consistent security standards. But SSO protocols are just ways for an identity provider to share information about an authenticated identity with another service. Me having a way to tell my vendor “yeah, that’s Bob” doesn’t tell m...2024-12-3042 minUnofficial SAP on Azure podcastUnofficial SAP on Azure podcast#219 - The one with SSO to SAP GUI using Global Secure Access (Martin Raepple) | SAP on Azure Video Podcast In episode 219 of our SAP on Azure video podcast we talk about about SSO to the SAP GUI using Global Secure Access. In a previous episode we already talked about using MFA with SAP GUI leveraging the SAP Secure Login Service. Today we look again at providing a seucre access from your SAP GUI to your SAP system, but this time using Microsoft Global Secure Access. For this we have Martin Raepple joining!Find all the links mentioned here: https://www.saponazurepodcast.de/episode219Reach out to us for any feedback / questions:* Robert Boban: https://www.linkedin...2024-11-2932 minUnofficial SAP on Azure podcastUnofficial SAP on Azure podcast#206 - The one with the Power Platform & SSO deep dive (Scott Woodall & Martin Pankraz) | SAP on Azure Video PodcastIn episode 206 of our SAP on Azure video podcast we take a look behind the configuration for principal propagation with Power Automate, Azure API Management and SAP. In previous episodes we talked about the new Single Sign-On capabilities of the SAP ERP Connector and the SAP OData Connector. We talked about the benefits and also showed how this can be used in Power Automate, Copilot Studio and other applications. Talking about SSO is always a little complicated, but today we till take a closer look on how to setup principal propagation with Power Platform and SAP using the SAP OData...2024-08-3039 minColdFusion AliveColdFusion Alive139 All About Adobe ColdFusion 2023 (Part 2: PDF, CCS, SSO, perf, security) with Mark TakataMark Takata talks about “All About Adobe ColdFusion 2023 (Part 2: PDF, CCS, SSO, perf, security)” in this episode of ColdFusion Alive Podcast with host Michaela Light. “…So we decided to build this thing called CCS central configuration server. And it runs at the command line, basically, and allows you to control your servers from a central location.”. Show notes Enhanced HTML-to-PDF Conversion New HTML-to-PDF conversion engine Supports new CSS features for pixel perfect PDFs Imbed audio, video and SVG Old tags features for manipulation of PDFs and forms etc still work Increased file size limit by x100 Optional f...2024-08-251h 03Community IT Innovators Nonprofit Technology TopicsCommunity IT Innovators Nonprofit Technology TopicsSingle Sign On (SSO) for Nonprofits pt 2In part 2, we discuss Single Sign On (SSO) implementation and roll out, and answer questions from the webinar audience. In part 1, our guests Steve Longenecker and Phil Oswald Christano define SSO and go over what it does and doesn't do. We discuss the unfortunate fact that each app interacts with SSO differently so you have to enable it for each app. However, if you use Google or Microsoft you already have some basic tools to implement SSO.If you have heard about Single Sign On (SSO) and wondered what it can do for...2024-07-2622 min