Microsoft Threat Intelligence Podcast cover image

Octo Tempest Threat Actor Profile

Microsoft Threat Intelligence Podcast

CHAPTER

Assuming Compromised First Factor and Leveraging Access Management Gaps

Learn about the importance of assuming the first factor of authentication is compromised and structuring alerting, detection, MFA, and conditional access policies accordingly.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner