The Rise of AI Threats: Identity Management
Join guest speaker John Howie to learn about the rising threat of AI to identity management systems, and what steps you can take today to protect your organization. Read more…
Getting More Out of Microsoft Entra ID With Extension and Custom Security Attributes
Microsoft Entra ID’s directory extension attributes and custom security attributes offer powerful ways to extend and enhance the functionality and security of your identity management system. Read more…
Harnessing the Power of Microsoft Entra Domain Services: A Game-Changer for Cloud Identity Management
Learn about the benefits of Microsoft Entra Domain Services, common use cases, and how IT teams can determine if it’s the right fit for their needs Read more…
Migrating from Active Directory Federation Services to Microsoft Entra ID
The benefits of enhanced security, reduced infrastructure costs, and improved scalability align with the needs of modern organizations looking to thrive in a digital-first world. Read more…
Understanding Privileged Access Management (PAM)
Privileged Access Management (PAM) is an integral component of an organization’s cyber defenses. In this webinar, learn about the benefits of PAM, common use cases, and get an overview of Saviynt CPAM and Microsoft PIM. Read more…
Transform Your Security Strategy with Microsoft Sentinel and a Modern Managed SOC
Learn how Microsoft Sentinel can help create a modern SOC powered by AI, automation, and Microsoft’s deep understanding of the threat landscape. Read more…
Oxford Computer Group recognized as a Microsoft Security Excellence Awards finalist for Identity Trailblazer
Oxford Computer Group is honored to named an Identity Trailblazer finalist for the 2024 MISA Excellence Awards. Read more…
How Misconfigured Hybrid Identity Setups Can Compromise Cybersecurity
Learn how misconfigured hybrid identity setups can increase your vulnerable attack surface and lead to compromise of Microsoft Entra ID. Read more…
Fortifying Your Cyber Defenses: Mastering Microsoft Defender Against Token Theft and Adversary-in-the-Middle Attacks
Dive into the complex world of cybersecurity and learn how you can use Microsoft Defender to help thwart token theft and adversary-in-the-middle attacks. Read more…
Demystifying Modern Authentication
This webinar breaks down modern authentication and its components, leaving you with a clear view of how the solutions work and how to get your organization started. Read more…