Podcast Episodes
Back to Search
Your Endpoints Are Lying to You: Why Intune Alone Isn’t Enough
(00:00:00) The Promise of Tune and Azure
(00:00:37) The Limits of Intune Alone
(00:00:57) The Seven Wounds of Unmanaged IT
(00:04:05) The Power of Az…
2 months, 3 weeks ago
The Backup Operator from Hell: Why Your Azure Backups Aren’t as Safe as You Think
(00:00:00) The Backup Operator from Hell
(00:00:35) The Silent Threat of Defaults
(00:01:01) The Many Faces of the Backup Operator
(00:01:38) The Lul…
2 months, 3 weeks ago
Why Microsoft Fabric Is Becoming the New Operating System for Enterprise Data
(00:00:00) The Fabric Platform: A Unified Approach to Data Management
(00:00:45) The Fragmentation Problem
(00:02:24) Fabric: A Solution to Fragmenta…
2 months, 3 weeks ago
MCP & Semantic Kernel: Building AI Agents That Take Action, Not Just Chat
(00:00:00) Transforming AI from Talker to Worker
(00:00:40) The Shift from Q&A to Action
(00:01:50) The Three Ingredients of AI Orchestration
(00:04:…
2 months, 3 weeks ago
RAG vs Copilot: When You Need Your Own AI — and When You Don’t
(00:00:00) The Power of Retrieval Augmented Generation (RAG)
(00:00:45) Copilot vs. Large Language Models
(00:02:07) Copilot's Strengths and Limitati…
2 months, 3 weeks ago
Why Your Intune Deployment Is A Security Risk
(00:00:00) The Hidden Threats in Intune Deployments
(00:00:54) The Modern Predator's Prey: Identity and Authentication
(00:01:54) The Interconnected …
2 months, 3 weeks ago
Why Your Threat Analytics Is Useless (The Report You Missed)
(00:00:00) The Power of Threat Analytics
(00:00:01) The Neglect of Threat Analytics
(00:00:49) The True Potential of Threat Analytics
(00:01:57) The …
2 months, 3 weeks ago
The M365 Audit Logs You're Ignoring: Why Zero Trust is a Lie Without Them
(00:00:00) Zero Trust and Log Analysis
(00:00:21) The Importance of Continuous Monitoring
(00:00:37) Identity Verification: The First Line of Defense…
2 months, 3 weeks ago
Why Your M365 Security Fails Against Social Engineering
(00:00:00) Microsoft 365 Security Alert
(00:00:06) The Weakness in MFA
(00:00:52) Case File 1: Teams Phishing Inside the Perimeter
(00:02:02) Correct…
3 months ago
Teams Channels Are Not Secure By Default: The Admin Lie
(00:00:00) The Importance of Secure Microsoft Teams Configuration
(00:00:43) Case Studies: Guest Access Gone Wrong
(00:02:49) The Truth About Private…
3 months ago