Podcast Episodes

Back to Search
Your Endpoints Are Lying to You: Why Intune Alone Isn’t Enough
Your Endpoints Are Lying to You: Why Intune Alone Isn’t Enough

(00:00:00) The Promise of Tune and Azure
(00:00:37) The Limits of Intune Alone
(00:00:57) The Seven Wounds of Unmanaged IT
(00:04:05) The Power of Az…

2 months, 3 weeks ago

Short Long
View Episode
The Backup Operator from Hell: Why Your Azure Backups Aren’t as Safe as You Think
The Backup Operator from Hell: Why Your Azure Backups Aren’t as Safe as You Think

(00:00:00) The Backup Operator from Hell
(00:00:35) The Silent Threat of Defaults
(00:01:01) The Many Faces of the Backup Operator
(00:01:38) The Lul…

2 months, 3 weeks ago

Short Long
View Episode
Why Microsoft Fabric Is Becoming the New Operating System for Enterprise Data
Why Microsoft Fabric Is Becoming the New Operating System for Enterprise Data

(00:00:00) The Fabric Platform: A Unified Approach to Data Management
(00:00:45) The Fragmentation Problem
(00:02:24) Fabric: A Solution to Fragmenta…

2 months, 3 weeks ago

Short Long
View Episode
MCP & Semantic Kernel: Building AI Agents That Take Action, Not Just Chat
MCP & Semantic Kernel: Building AI Agents That Take Action, Not Just Chat

(00:00:00) Transforming AI from Talker to Worker
(00:00:40) The Shift from Q&A to Action
(00:01:50) The Three Ingredients of AI Orchestration
(00:04:…

2 months, 3 weeks ago

Short Long
View Episode
RAG vs Copilot: When You Need Your Own AI — and When You Don’t
RAG vs Copilot: When You Need Your Own AI — and When You Don’t

(00:00:00) The Power of Retrieval Augmented Generation (RAG)
(00:00:45) Copilot vs. Large Language Models
(00:02:07) Copilot's Strengths and Limitati…

2 months, 3 weeks ago

Short Long
View Episode
Why Your Intune Deployment Is A Security Risk
Why Your Intune Deployment Is A Security Risk

(00:00:00) The Hidden Threats in Intune Deployments
(00:00:54) The Modern Predator's Prey: Identity and Authentication
(00:01:54) The Interconnected …

2 months, 3 weeks ago

Short Long
View Episode
Why Your Threat Analytics Is Useless (The Report You Missed)
Why Your Threat Analytics Is Useless (The Report You Missed)

(00:00:00) The Power of Threat Analytics
(00:00:01) The Neglect of Threat Analytics
(00:00:49) The True Potential of Threat Analytics
(00:01:57) The …

2 months, 3 weeks ago

Short Long
View Episode
The M365 Audit Logs You're Ignoring: Why Zero Trust is a Lie Without Them
The M365 Audit Logs You're Ignoring: Why Zero Trust is a Lie Without Them

(00:00:00) Zero Trust and Log Analysis
(00:00:21) The Importance of Continuous Monitoring
(00:00:37) Identity Verification: The First Line of Defense…

2 months, 3 weeks ago

Short Long
View Episode
Why Your M365 Security Fails Against Social Engineering
Why Your M365 Security Fails Against Social Engineering

(00:00:00) Microsoft 365 Security Alert
(00:00:06) The Weakness in MFA
(00:00:52) Case File 1: Teams Phishing Inside the Perimeter
(00:02:02) Correct…

3 months ago

Short Long
View Episode
Teams Channels Are Not Secure By Default: The Admin Lie
Teams Channels Are Not Secure By Default: The Admin Lie

(00:00:00) The Importance of Secure Microsoft Teams Configuration
(00:00:43) Case Studies: Guest Access Gone Wrong
(00:02:49) The Truth About Private…

3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us