Channel Avatar

StrongDM @UCYMSnwT5uCwczfT0hrWelkQ@youtube.com

737 subscribers - no pronouns :c

StrongDM is the leader in Zero Trust PAM. We are a policy-ba


01:01
Notify European Citizens that their Sessions are Being Recorded
34:25
Cybersecurity Leadership & IAM Strategies: Lessons from Andy Weeks
35:58
HACKERverse CEO Mariana Padilla on Cybersecurity, AI, and Building Trust | John Has Trust Issues
00:43
Restrict Access to Resources to EU for GDPR Resources
00:40
Restrict Access to Resources to EU only
02:52
Analytics Dashboards | StrongDM
01:29
Just-in-Time Access Workflows | StrongDM
01:31
Just-in-Time Access Workflows with Slack | StrongDM
02:05
Just-in-Time Access Workflows with Microsoft Teams | StrongDM
02:35
Access Workflows with Jira | StrongDM
08:55
Kids In Cybersecurity: Insights, Laughs, and Lessons! Part 3 | John Has Trust Issues
05:48
Kids In Cybersecurity: Insights, Laughs, and Lessons! Part 2 | John Has Trust Issues
06:00
Kids In Cybersecurity: Insights, Laughs, and Lessons! Part 1 | John Has Trust Issues
01:31
Requesting and Granting Access to AWS Management Console | StrongDM
32:26
Uncovering Hidden Threats: Dr. Willy R. Vasquez on Video Codecs, CVEs, and Zero Trust
00:36
Require MFA for Production SSH Servers
14:13
Adapting Privileged Access Management for the Cloud-First World | Stronger Together Podcast
00:51
Restrict Connecting to Production Kubernetes clusters to Only During Business Hours
02:53
Using Policies to Correlate Authorization to Access
02:31
Using Go and Cedar Policy Language
00:49
Permit Connections to Production Kubernetes Clusters
32:04
Zero Trust & Cybersecurity Strategies: CISO Shares Insights | John Has Trust Issues Podcast
02:57
Using Context Signals to Make Better Decisions
00:46
Restrict Connecting to a Critical Database to Only During Business Hours
02:22
The Problem with Legacy PAM Solutions
34:25
What It’s Like to Be a Pen-Tester: Ethical Hacking & Cybersecurity Career Insights | JHTI
00:35
Restrict SELECT Actions Based on Geo Privacy Requirements, Returning 10 Rows
01:52
The Concept of Privilege Access Has Changed
01:09
Require Admin Approval to Update "Cardholders" Table On Any PCI Database
08:23
ADT Breach Update: Stolen Credentials Cause Second Hack in 2024 | John Has Trust Issues
01:51
The Complexity of Modern Environments
00:47
Require an MFA Prompt to Connect to all Prod Resources
03:09
How StrongDM "Right-Sizes" Authorization
00:40
Forbid access to the database unless the user is in the approved role
20:42
Tech Evolution, Trust Challenges, and Career Lessons with Michele Thomas Part 2 | JHTI Podcast
22:43
Tech Evolution, Trust Challenges, and Career Lessons with Michele Thomas Part 1 | JHTI Podcast
00:43
Limit Max Rows for Non-Approved Roles
00:32
Forbid access to the users table to prevent data exfiltration and unauthorized access
00:31
Require MFA prompt to read data from the users table
00:49
Require Admin Approval to Update Cardholders Table
00:49
Forbid and Revoke Sessions to Prod Resources from Unhealthy Endpoints
03:46
MFA for Database Actions (With Zero Trust Action Policies)
01:05
Why Legacy PAM Solutions Cannot Deliver for Today’s Enterprise
02:29
MFA for Windows Remote Desktop
02:58
MFA for Network Devices
01:18
How StrongDM is Different
01:31
Security or Productivity? Zero Trust PAM Delivers Both
01:32
What is Zero Trust PAM?
01:17
An Introduction to Privileged Access Management (PAM)
01:04
Compliance Never Stops Neither Should Your PAM
01:43
Never, Ever Trust, Always, Always Verify A New Era for PAM
01:36
With Fine Grained Policies & Continuous Authorization, StrongDM is Delivering on the Promise of PAM
03:43
MFA for SSH
03:21
MFA for Oracle DB
07:35
The Zero Trust Roller Coaster | John Has Trust Issues
12:41
AT&T Snowflake Incident Explained: How to Mitigate Risks with MFA
18:27
Security Expert: Continuous Validation of Zero Trust, Importance of MFA, CISO Productivity Tips
10:19
NSA Zero Trust Maturity Guidance: Explained
05:23
Enabling MFA Across Various Resources (Postgres and SSH)
03:20
StrongDM Zero Trust Policies: Granular Authorization to Privileged Resources (Access and Actions)