show episodes
 
Artwork

1
Knee-deep in Tech

Alexander Arvidsson, Simon Binder, Heini Ilmarinen

Unsubscribe
Unsubscribe
Monthly+
 
Knee-Deep In Tech is a bi-weekly(-ish) podcast covering IT and technology, focusing on the Microsoft stack. We are three MVPs and Microsoft Certified Trainers with between us over 35 years of IT infrastructure experience. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
This is the Official Podcast of ~9, where she shares her truth and speaks to friends of all nationalities and beliefs about theirs. Topics discussed include Spirituality, Music, Cryptocurrency, Entrepreneurship, and anything else that lights our fire. No topic is off-limits. Welcome to the Podcast where Understanding Meets Action. Support this podcast: https://podcasters.spotify.com/pod/show/the-intune-instrument/support
  continue reading
 
Community Radio for YOU ​ INTune Radio CIC has been founded to serve and reach Shropshire, Telford and Wrekin communities, businesses and charities; and to essentially bring back local radio to our beautiful county. We are the only independent community radio station in Shropshire and we feature interviews with inspiring local people, and showcase local bands next to international artists, to create a dynamic mix of beats and discussion. We work with local charities and communities to help r ...
  continue reading
 
Artwork

1
ThreatCast

Threatscape

Unsubscribe
Unsubscribe
Monthly+
 
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
  continue reading
 
Artwork
 
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
  continue reading
 
Artwork
 
Making statements and discussions about becoming the change I want to see. Check out MiriTeresa.com for more content. Support this podcast: https://podcasters.spotify.com/pod/show/miri-teresa/support
  continue reading
 
Welcome to my closet literally and figuratively. In here I want foster a safe and free space to discuss all things tarot and spirituality. Just because you are keeping your spiritual practices secret doesn't make your practice any less valid. I hope you'll join me as we embark on this journey together and perhaps one day we'll venture out of the closet. But until then let's have some fun while we're here. Support this podcast: https://podcasters.spotify.com/pod/show/Tarot-Closet-Reflections/ ...
  continue reading
 
Loading …
show series
 
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss new features and updates in Intune, including autopilot for existing devices, Intune enrollment attestation, and mobile application management (MAM). They explain how autopilot for existing devices allows organizations to enroll on-premise joined devices into autopilot usin…
  continue reading
 
Send us a Text Message. In this episode of ThreatCast Colin Reid, Commercial Director at Threatscape, is joined by Paul Conroy to discuss: the current challenges and rewards associated with digital transformation, how these transformations can be successfully implemented, and how 2024’s evolving cyber threat landscape can impact organisations’ ques…
  continue reading
 
Summary In this episode, Andy and Adam discuss various resources and methods for getting training and learning about Microsoft and other technology solutions. They cover topics such as official documentation, certification tracks, Ninja training, Microsoft Mechanics, the Tech Community, customer connection programs, building a personal lab, and the…
  continue reading
 
Unlock the secrets of seamlessly integrating cutting-edge technology into legacy systems with insights from Jeff Brown of Lowry Solutions. Learn the crucial distinctions between Greenfield initiatives and projects that must harmonize with existing infrastructure. Jeff shares his expertise on conducting meticulous surveys, navigating technical debt,…
  continue reading
 
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss several cybersecurity news stories. They cover the hack of the Trump campaign's emails by Iranian hackers, the breach of the National Public Data records, and Microsoft's new requirement for admins to enable multi-factor authentication (MFA). They also touch on the importan…
  continue reading
 
Welcome to Episode 382 of the Microsoft Cloud IT Pro Podcast. In this episode, we dive into three essential tools for safeguarding your organization in the cloud-first world: Security Defaults in Microsoft Entra ID, Conditional Access Policies, and Microsoft Secure Score. Join us as we talk through and rationalize each solution, including when and …
  continue reading
 
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss Microsoft's Defender for Storage, a cloud-native security solution for Azure Blob Storage, Azure Files, and Azure Data Lake Storage. They highlight the three major impacts on data workloads: malicious file uploads, sensitive data exfiltration, and data corruption. The solut…
  continue reading
 
Send us a Text Message. Join us as we delve into the intricacies of eDiscovery with Microsoft's expert, Ryan John Murphy. Discover why eDiscovery is one of the most powerful and sometimes overlooked tools in Microsoft 365. Learn about the hidden powers, the responsibilities, and the risks associated with it. What this Podcast covers: Why is eDiscov…
  continue reading
 
Hot enough for you, Data Center Therapy listeners? Go ahead, grab a plate of ribs, corn, and green beans, and belly up to the listening picnic table, as your ears get to feast on the freshness that is Episode 94. In this one, our sun-drenched hosts, Mr. Matt “8 Panel Chamois” Yette and Mr. Matt “Deep Cycle Marine” Cozzolino share their summer explo…
  continue reading
 
In this episode we dive into the critical world of backup strategies. Join us as we explore the essentials of why every business needs a robust backup plan and how to create one that stands the test of time. We'll break down the core standards and elements of an effective backup strategy, including immutable backups and encryption, and the 3-2-1 Ba…
  continue reading
 
Welcome to Episode 381 of the Microsoft Cloud IT Pro Podcast. In this episode we discuss Microsoft Graph Data Connect, a service that allows organizations to access and manage data from Microsoft 365 in a secure, scalable, and efficient manner. Like what you hear and want to support the show? Check out our membership options. Show Notes Elgato’s Ne…
  continue reading
 
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss Defender CSPM (Cloud Security Posture Management). They explain that CSPM is the process of monitoring cloud-based systems and infrastructure for risks and misconfigurations. They highlight the key capabilities of CSPM, including automation, monitoring and managing IaaS, Sa…
  continue reading
 
Send us a Text Message. In this episode of ThreatCast, Paul O'Sullivan is joined by Jim Griffiths, Head of Information Security at Associated British Foods, to discuss the intricacies of gaining board-level support for robust cyber security practices. They delve into Jim's extensive career, from his beginnings in the Royal Air Force to his current …
  continue reading
 
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss the aftermath of the CrowdStrike failed software update. They express empathy for those impacted by the incident and discuss the importance of collaboration in the cybersecurity industry. They also explore the need for transparency from security vendors and the potential im…
  continue reading
 
Welcome to Episode 380 of the Microsoft Cloud IT Pro Podcast. In this episode we discuss some of the latest security breaches that you should be on the lookout for and then we get into AD FS migrations and if you should consider it. Like what you hear and want to support the show? Check out our membership options. Show Notes AT&T says criminals sto…
  continue reading
 
Summary In this episode, Andy and Adam discuss a blog post titled 'Cybersecurity is Full' that challenges the hype around cybersecurity careers. They explore the saturation of the field, the value of certifications and conferences, the optional nature of cybersecurity in organizations, and the stress and challenges of the industry. They emphasize t…
  continue reading
 
Send us a Text Message. In this week’s episode of ThreatCast, Ru Campbell is joined by Matt Call, Principal Product Manager at Microsoft, who shares insight on his journey from consulting to product engineering, touching on the challenges associated with implementing changes across endpoints and the vulnerabilities created by over-privileged user a…
  continue reading
 
In this episode of the Blue Security Podcast, Andy and Adam discuss Defender for Servers, a cloud security solution offered by Microsoft. They explain that Defender for Servers is part of the larger Defender for Cloud umbrella and is designed to protect cloud infrastructure, specifically servers. They discuss the different plans available, includin…
  continue reading
 
Welcome to Episode 379 of the Microsoft Cloud IT Pro Podcast. In this episode, Ben and Scott take a look at Azure Verified Modules, a new initiative from Microsoft to consolidate and set the standards for what a good Bicep and/or Terraform module looks like. Like what you hear and want to support the show? Check out our membership options. Show Not…
  continue reading
 
In this episode of the Blue Security Podcast, Andy and Adam discuss recommended settings for Exchange Online Protection (EOP) and Microsoft Defender for Office (MDO). They explain that EOP is the core security for M365 subscriptions, providing anti-malware, anti-spam, and anti-phishing protection. They also highlight the importance of the secure by…
  continue reading
 
Send us a Text Message. In this week’s episode of ThreatCast, Paul O’Sullivan is joined by Christian Toon, Head of Cyber Professional Services and former CISO at Pinsent Masons. With over 15 years’ experience in the cyber industry, Christian now leads his team in delivering security with purpose, building out programmes to proactively address secur…
  continue reading
 
We were delighted to pose listener questions to Alex Wagner, Liberal Democrates candidate for Shrewsbury. This was the third interview with local candidates standing for your election in Shrewsbury. This was also the third interview recorded within our Darwin Shopping Centre studio before it's fit out. For more information about INTune Radio CIC – …
  continue reading
 
What's the best way to manage your enterprise's rugged Zebra devices effectively? Join Brett Cooper, Mark Banks, and Patrick McGlynn as they unpack the most comprehensive Mobile Device Management (MDM) options for 2024. From mastering application deployment to ensuring robust security controls and real-time inventory tracking, this episode promises…
  continue reading
 
In this episode, Andy and Adam discuss three cybersecurity news stories. They talk about a small town in Massachusetts that lost over $445,000 in an email scam, the Biden administration's ban on Kaspersky antivirus software, and a cyber attack on Crown Equipment, a forklift manufacturer. The main takeaways from the conversation are the importance o…
  continue reading
 
We were delighted to pose listener questions to Daniel Kawczynski, Conservative candidate for Shrewsbury. This was the second interview with local candidates standing for your election in Shrewsbury. This was also the second interview recorded within our Darwin Shopping Centre studio before it's fit out. For more information about INTune Radio CIC …
  continue reading
 
What things Microsoft lurk in the shadows, basements, and dark closets of your I.T. organization? Which parts of Active Directory, Exchange, or M365 keep you up at night, racked with anxiety and fear? Is there no relief from scary upgrades and failures to be had? Fear not, loyal compatriots! Bust out your flashlights, proton packs, and ectoplasm-re…
  continue reading
 
In this episode of the Blue Security Podcast, Andy and Adam discuss three main topics: the unauthorized user access at Snowflake, the cybersecurity issue at Finley Automotive Group, and the cyber threats surrounding the upcoming Olympics in Paris. They highlight the importance of implementing strong security controls like multi-factor authenticatio…
  continue reading
 
Send us a Text Message. In this week’s episode of ThreatCast Threatscape’s Ru Campbell is joined by Merill Fernando, Principal Product Manager in the customer experience team at Microsoft. Merill discusses his extensive experience with helping enterprise organisations to effectively deploy and utilise Microsoft Entra ID, the importance of realistic…
  continue reading
 
Ready to unlock the secrets of seamless mobile device management with Microsoft Intune? This episode of the Enterprise Mobility Roundup features Brian Grant, solution architect at Atea, and Patrick McGlynn, BlueFletch lead system engineer, sharing invaluable lessons from their hands-on experience with Intune deployments. We explore why organization…
  continue reading
 
We were delighted to pose listener questions to Dr Julia Buckley, Labour candidate for Shrewsbury. This was the first interview with local candidates standing for your election in Shrewsbury. This was also the first interview recorded within our Darwin Shopping Centre studio before it's fit out. For more information about INTune Radio CIC – or to a…
  continue reading
 
In this episode, Andy and Adam discuss the updates and clarifications made by Microsoft regarding the security concerns surrounding the Recall feature on Copilot Plus PCs. They highlight the changes, such as the option to proactively enable Recall during the out-of-box experience, the requirement of Windows Hello enrollment and proof of presence fo…
  continue reading
 
Welcome back for another new episode, Data Center Therapy aficionados! This week, our adventurous and hard-working hosts, Matt “Master Link” Yette and Matt “Chromed Crankset” Cozzolino open up the virtual studios to IVOXY’s own Ryan “Security Gusset” Grelck, who joins the fellas to talk all things endpoint-related for the first part of the podcast.…
  continue reading
 
Welcome to Episode 378 of the Microsoft Cloud IT Pro Podcast. In this episode we discuss Azure Compute Fleet, a new Preview service announced at Microsoft Build 2024. Azure Compute Fleet is a new Azure infrastructure service that lets you deploy Azure compute capacity across different virtual machine SKUs, availability zones, and pricing models. It…
  continue reading
 
Send us a Text Message. Join Paul O’Sullivan, Threatscape’s UK Sales Director, for this episode of ThreatCast as he sits down with Mark Parr, Head of Technology at Buzzacott, to discuss achieving board-level buy-in for cyber security strategy, the importance of digital skills and employee support, and the challenges (and benefits) of investing in a…
  continue reading
 
The conversation covers three primary themes: Ticketmaster data breach, Slack's data scraping, and Windows Recall feature. The Ticketmaster breach is discussed in detail, highlighting the stolen data, phishing risks, and the importance of password management. The conversation then shifts to Slack's data scraping controversy, addressing concerns abo…
  continue reading
 
Ready to stay ahead of the curve? Tune in to this episode as we unpack the latest shifts in VMware following its exciting acquisition by Broadcom. We'll dive into crucial updates, like the EUC spin-off and revamped academic pricing, and what they mean for you. But that's not all – we'll break down the changes to your existing licenses and will disc…
  continue reading
 
In this episode of the Blue Security Podcast, Andy and Adam discuss the security and privacy announcements from Microsoft Build. They cover topics such as AI content safety, Copilot capabilities, security enhancements in Microsoft Edge, and new Windows security features. They also touch on the deprecation of NTLM and the introduction of Copilot Plu…
  continue reading
 
Welcome back, long-awaiting listeners, as your favorite IT podcast with a healthy dose of empathy, Data Center Therapy, returns after a seven-month hiatus. It’s been too long, we know, but we’re back and we’re recharged so we can bring you the first of many new episodes with exciting, topical and relevant content. Thanks for joining us! On this epi…
  continue reading
 
Welcome to Episode 377 of the Microsoft Cloud IT Pro Podcast. In this episode, Ben and Scott talk about a recent incident at Google Cloud where one of their customer accounts was completely wiped out without notice. Then they dive into Microsoft Copilot for Security. Ben has been getting hands on with it and it is expensive. They discuss pricing fo…
  continue reading
 
Loading …

Quick Reference Guide