Bronwyn Mercer (@bron_mercer) 's Twitter Profile
Bronwyn Mercer

@bron_mercer

Cyber nerd | Make the secure way the easy way | views my own

ID: 64154345

calendar_today09-08-2009 10:55:09

448 Tweet

613 Followers

1,1K Following

Sonia Cuff (@soniacuff) 's Twitter Profile Photo

Continuous Access Evaluation of identity conditional access policies is now Generally Available! techcommunity.microsoft.com/t5/azure-activ… #identity #azure #microsoft #cloud #ITPro #AzOps #AzureAD

markwahl (@markwahl) 's Twitter Profile Photo

We're enhancing #AzureAD to simplify governing access to your AD-based applications too. In this new preview, you can write M365 groups and Azure AD security groups into on-premises AD DS as security groups. docs.microsoft.com/azure/active-d…

We're enhancing #AzureAD to simplify governing access to your AD-based applications too. In this new preview, you can write M365 groups and Azure AD security groups into on-premises AD DS as security groups.
docs.microsoft.com/azure/active-d…
ComfyCon AU (@comfyconau) 's Twitter Profile Photo

Comfycon challenges AISA National. If we can assemble a quality, 100% female or non binary conference, for the weekend after the 18th November, that's the weekend after PerthSec, you make a donation to AusWomenInSecurity to the Project Friedman initiative for female first time speakers.

The Azure Security Podcast (@azuresecpod) 's Twitter Profile Photo

Episode #67 is out! In this episode we talk with guest Bronwyn Mercer about some war stories and best practices for privileged access. Also, the news. Happy Thanksgiving for our US-based listeners: we’re thankful for all of you that tune in!

Jake Williams (@malwarejake) 's Twitter Profile Photo

If you're starting out in security and find the breadth of stuff you "need to know" daunting, I want to give you some perspective: 1. The field has broadened - dramatically. The "baseline knowledge" grows every year. Anyone saying otherwise is lying or uninformed. 1/

Merill Fernando (@merill) 's Twitter Profile Photo

About to jump on the Microsoft Secure, Australia session with Jayden Cooke (ACSC) and Bronwyn Mercer to talk about Innovating with the Essential Eight and how you can implement stronger MFA authentication with Microsoft Entra Azure AD. I will be on the QnA answering all your

About to jump on the Microsoft Secure, Australia session with Jayden Cooke (ACSC) and <a href="/bron_mercer/">Bronwyn Mercer</a>  to talk about Innovating with the Essential Eight and how you can implement stronger MFA authentication with Microsoft Entra Azure AD.

I will be on the QnA answering all your
Matt Zorich (@reprise_99) 's Twitter Profile Photo

We are often asked to explain token theft to customers, and the impacts of it, via both adversary in the middle and token theft from devices. I have a go to list of resources I often point customers towards. First, the Token Tactics blog I helped write - microsoft.com/en-us/security…

Maddie Stone (@maddiestone) 's Twitter Profile Photo

North Korean actors 🇰🇵 are targeting security researchers again including use of at least one 0-day. IOCs in the blog ⬇️ If you've been in contact, please reach out blog.google/threat-analysi…

North Korean actors 🇰🇵 are targeting security researchers again including use of at least one 0-day. IOCs in the blog ⬇️ If you've been in contact, please reach out

blog.google/threat-analysi…
Sarah Young (@_sarahyo) 's Twitter Profile Photo

The 2024 Microsoft digital defence report is hereeeeeee (seriously though, it’s put together by really smart people and really useful and you should go and read it) microsoft.com/en-us/security…