The Show will provide you news, information, and opinion on the latest in Cloud and Hybrid technologies.
…
continue reading
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman and Paul Robichaux, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
…
continue reading
The podcast that covers the latest news, notes, commentary and listener questions on Microsoft cloud technologies including Windows Azure, Office 365 and SharePoint.
…
continue reading
Den offisielle podkast siden til de gretne gamle gubbene i "BlåSkjerm Brødrene" (BluesScreen Brothers), sett på scener rundt omkring i verden på diverse IT- konferanser. Brødrene er Olav Tvedt (@OlavTwitt), Alexander Solaat Rødland [@AlexSolaat], Pål-Erik Winther (@PeWinther) og Marius Solbakken (@mariussmellum). Dukker også opp forskjellige gjester av varierende kvalitet ;-) Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
1
Windows Server 2025 and Active Directory with Orin Thomas
43:26
43:26
Play later
Play later
Lists
Like
Liked
43:26
What does Windows Server 2025 bring to Active Directory? Richard chats with Orin Thomas about the new version of Windows Server coming and what to expect around Active Directory. Orin talks about how mature the Windows Server space is, so only incremental improvements are warranted, but they are important ones - like retiring NTLM once and for all.…
…
continue reading
1
C3pbot, Kaspersky, Octo2 , Honkai: Star Rail, ServiceNow, LinkedIn... - SWN #416
29:32
29:32
Play later
Play later
Lists
Like
Liked
29:32
C3pbot, Kaspersky, Octo2 Electric Boogaloo, Honkai: Star Rail, ServiceNow, LinkedIn, IoT, Josh Marpet, and more on the Cyber Security News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-416
…
continue reading
1
Vulnerable APIs and Bot Attacks: Two Interconnected, Growing Security Threats - David Holmes - ASW #300
1:07:51
1:07:51
Play later
Play later
Lists
Like
Liked
1:07:51
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
…
continue reading
1
Authentication and Authorization in the AI Era - Shiven Ramji - BSW #365
1:06:53
1:06:53
Play later
Play later
Lists
Like
Liked
1:06:53
In the leadership and communications segment, CISA Releases Cyber Defense Alignment Plan for Federal Agencies, UnitedHealth Group CISO: We had to ‘start over’ after Change Healthcare attack, 20 Essential Strategies for Leadership Development Success, and more! AI is bringing productivity gains like we’ve never seen before -- with users, security te…
…
continue reading
1
TEC Special: AI, Identity, and the Future of IT with Shinesa Cambric - The Practical 365 Podcast S4 E28
33:14
33:14
Play later
Play later
Lists
Like
Liked
33:14
Cybersecurity expert Shinesa Cambric joing Steve Goodman to discuss the evolving landscape of IT. In this episode, we explore the parallels between AI adoption and the cloud revolution, and get into the changing nature of identity in our digital world. Shinesa shares insights from her 20+ years in IT and gives a sneak peek into her upcoming TEC 202…
…
continue reading
Get personalized, context aware experiences as you work by harnessing the power of advanced large language models, the Microsoft Graph, and the internet with Microsoft 365 Copilot. By automating the retrieval of relevant information, Copilot eliminates the need for manual searches, allowing you to focus on what matters. With a robust orchestration …
…
continue reading
1
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More... - SWN #415
34:59
34:59
Play later
Play later
Lists
Like
Liked
34:59
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-415
…
continue reading
1
Do phishing tests do more harm than good? & Speed, Flexibility, and AI - Wolfgang Goerlich, Whitney Young - ESW #376
1:52:31
1:52:31
Play later
Play later
Lists
Like
Liked
1:52:31
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
…
continue reading
1
Exploding Pagers - Tod Beardsley - PSW #843
2:53:37
2:53:37
Play later
Play later
Lists
Like
Liked
2:53:37
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
…
continue reading
1
Asymmetric Encryption with Eli Holderness
38:35
38:35
Play later
Play later
Lists
Like
Liked
38:35
Do you know how asymmetric encryption works? While at the Kansas City Developers Conference, Richard sat down with Eli Holderness to discuss many of the encryption technologies being used today—and the new options coming in the future! Eli talks about how symmetrical encryption and public key encryption have been the focus of modern encryption, esp…
…
continue reading
1
Bringing Secure Coding Concepts to Developers - Dustin Lehr - ASW #299
1:02:26
1:02:26
Play later
Play later
Lists
Like
Liked
1:02:26
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
…
continue reading
1
Back to the office, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland... - SWN #414
34:40
34:40
Play later
Play later
Lists
Like
Liked
34:40
Back to the office serfs, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland, and more on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-414
…
continue reading
1
Solving the Cybersecurity Data Problem - Padraic O'Reilly - BSW #364
1:00:54
1:00:54
Play later
Play later
Lists
Like
Liked
1:00:54
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
…
continue reading
1
Li-On, Lazarus, Whatsup, Scattered Spider, Hadooken, Dead People, Aaran Leyland... - SWN #413
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12
Through the Fire and Li-On Flames, Lazarus, Whatsup, Scattered Spider, Hadooken, Dead People, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-413
…
continue reading
1
Cybersecurity has too many distractions and can the White House fix BGP? - Harish Peri, Harry Wilson, Darren Guccione - ESW #375
2:30:27
2:30:27
Play later
Play later
Lists
Like
Liked
2:30:27
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
…
continue reading
1
Recent Cyber Security Laws & Regulations - Lee Kim - PSW #842
3:04:37
3:04:37
Play later
Play later
Lists
Like
Liked
3:04:37
Lee comes on the show to discuss: EU CRA - https://en.wikipedia.org/wiki/CyberResilienceAct - its impact on bringing products to market and the challenges of enforcing such laws that require products to be "Secure" Recent legislation on disputes for federal agency fines - Chevron deference rule - supreme court decision, uncertainty, more or less cl…
…
continue reading
1
TEC Special: Paul Thurrott on Windows future & Copilot taking your job - The Practical 365 Podcast S04 E27
32:43
32:43
Play later
Play later
Lists
Like
Liked
32:43
On the show this week, Steve Goodman is joined by IT industry veteran, Paul Thurrott to talk a variety of subjects he'll be speaking on in his keynote at TEC 2024 - namely Windows and Copilot. As Microsoft have had a turbulent year with both, we get Paul's take on it. Want to stay up to date on all things Practical 365? Follow us on Twitter, Facebo…
…
continue reading
1
Microsoft 365 and PowerShell with Tony Redmond
38:01
38:01
Play later
Play later
Lists
Like
Liked
38:01
What can you do to Microsoft 365 with PowerShell? Turns out - almost anything! Richard talks to Tony Redmond about his ongoing efforts to educate sysadmins about the vast array of capabilities in M365, including all the PowerShell cmdlets that can let you retrieve and control everything in M365. There's now so much information that Tony and his tea…
…
continue reading
1
AI Trucks, Solid Concrete, Sonicwall, Progress, Rust, Apple, and more... - SWN #412
30:19
30:19
Play later
Play later
Lists
Like
Liked
30:19
AI Trucks, Solid Concrete, Sonicwall, Progress, Rust, Apple, and more, on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-412
…
continue reading
1
Paying Down Tech Debt, Rust in Firmware, EUCLEAK, Deploying SSO - ASW #298
56:25
56:25
Play later
Play later
Lists
Like
Liked
56:25
Considerations in paying down tech debt, make Rust work on bare metal, ECDSA side-channel in Yubikeys, trade-offs in deploying SSO quickly, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-298
…
continue reading
1
Cybersecurity and the Business - Theresa Lanowitz - BSW #363
56:32
56:32
Play later
Play later
Lists
Like
Liked
56:32
Cybersecurity resilience, different from cyber resilience, is critical as threats grow in frequency and complexity. With digital innovation driving business, cybersecurity resilience is essential for maintaining stakeholder trust and compliance. But where do you start? Theresa Lanowitz, Chief Evangelist at LevelBlue, joins Business Security Weekly …
…
continue reading
1
New Surface Pro & Surface Laptop | Copilot+ PCs for business
14:50
14:50
Play later
Play later
Lists
Like
Liked
14:50
Redefine personal and business computing by combining powerful AI capabilities with cutting-edge hardware using Copilot+ PCs. Whether you're developing apps that harness the full potential of the NPU or taking advantage of AI experiences like Windows Studio Effects, Copilot+ PCs offer a platform that is both robust and efficient. Vivek Pradeep, Vic…
…
continue reading
Check out this episode from the SWN Vault, hand picked by main host Doug White! This SDL episode was initially published on August 9, 2017. Doug explains the basics of how IP Addresses work, with help from Doug in an alternate dimension. Beware of the terminator! Show Notes: https://securityweekly.com/vault-swn-20…
…
continue reading
1
How to Make the World Quantum Safe - Vadim Lyubashevsky - ESW Vault
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break s…
…
continue reading
1
Hacker Heroes - Mark Loveless - PSW Vault
1:32:39
1:32:39
Play later
Play later
Lists
Like
Liked
1:32:39
Exploring the Hacking Landscape with Mark Loveless, AKA SimpleNomad Dive into the intricate world of cybersecurity with our featured guest, Mark Loveless, widely known by his handle SimpleNomad. With a rich history in the realm of information security, Mark is a seasoned professional, researcher, and thought leader. Mark's journey spans decades, ma…
…
continue reading
1
Evolving Generative AI with Alison Cossette
38:00
38:00
Play later
Play later
Lists
Like
Liked
38:00
How is generative AI evolving, and what can we do about it? While at NDC in Oslo, Richard chatted with Alison Cossette about her work as a data scientist before the ChatGPT explosion in November 2022 and what life has been like since the LLM came to town. Alison talks about the rigor of building AI models using generative AI before ChatGPT and how …
…
continue reading
Check out this episode from the SWN Vault, hand picked by main host Doug White! This SDL episode was initially published on November 8, 2017. What is encryption anyway? Doug and Russel explain symmetric encryption, asymmetric encryption, and how crypto gets broken! Show Notes: https://securityweekly.com/vault-swn-19…
…
continue reading
1
Leadership Lessons from the First 100 Episodes of CISO Stories - Todd Fitzgerald - BSW Vault
29:02
29:02
Play later
Play later
Lists
Like
Liked
29:02
Check out this episode from the BSW Vault, hand picked by main host Matt Alderman! This episode was initially published on November 29, 2022. Todd Fitzgerald, author of CISO Compass and host of CISO Stories, joins BSW to share his top leadership lessons from the first 100 episodes of CISO Stories. Todd interviews CISOs and gains insights into their…
…
continue reading
1
Close the Security Theater: Enter Resilience - Kelly Shortridge - ASW Vault
37:48
37:48
Play later
Play later
Lists
Like
Liked
37:48
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 9, 2023. What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theater to security chaos engineering? This segment answers these quest…
…
continue reading
1
TEC Special: Microsoft 365's Darkest Corners & PowerShell Scripting with Tony Redmond & Michel de Rooij - The Practical 365 Podcast S4 E26
31:39
31:39
Play later
Play later
Lists
Like
Liked
31:39
Joining Steve Goodman on this week's podcast, is Paul Robichaux - as a guest alongside MVPs Tony Redmond and Michel de Rooij. Tony talks to us about his upcoming TEC session and explores some of the darker secrets of Microsoft 365 and what IT teams need to know as they continue manage it. And managing it doesn't get more fun than when you use Power…
…
continue reading
1
Building AI BOMs - Helen Oakley - PSW #841
3:01:47
3:01:47
Play later
Play later
Lists
Like
Liked
3:01:47
Larry and Helen walk us through the AI supply chain landscape. Learn what goes into building and using AI models and the dangers that could lurk within. Segment Resources: Community efforts on AIBOM topic: https://github.com/aibom-squad This week: I want all the firmware, its not just TP-Link, CVEs for malware, BLE and your health, faking your own …
…
continue reading
1
Daleks, AVTECH, Palo Alto, VMWARE, Travel, California AI Dreamin', Aaran Leyland... - SWN #411
34:03
34:03
Play later
Play later
Lists
Like
Liked
34:03
Daleks, AVTECH, Palo Alto, VMWARE, Travel, California AI Dreamin', Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-411
…
continue reading
1
What asset management (ITAM) looks like outside cybersecurity - Danny Jenkins, Ed Skoudis, Jeremy Boerger, Maor Bin - ESW #374
1:44:09
1:44:09
Play later
Play later
Lists
Like
Liked
1:44:09
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
…
continue reading
1
The Security Risks of AI with Steve Poole
34:16
34:16
Play later
Play later
Lists
Like
Liked
34:16
Leadership wants to get on the AI bandwagon - what are the security risks? While at the Kansas City Developers Conference, Richard sat down with Steve Poole to talk about his experiences helping companies manage the risk of bringing AI into the company. Steve talks about the impact of introducing a new development stack, especially open-source stac…
…
continue reading