Podcast Episodes

Back to Search
M365 Audit Logs Zero Trust: The Microsoft 365 Audit Logs You’re Ignoring
M365 Audit Logs Zero Trust: The Microsoft 365 Audit Logs You’re Ignoring

Season 1

(00:00:00) Zero Trust and Log Analysis
(00:00:21) The Importance of Continuous Monitoring
(00:00:37) Identity Verification: The First Line of Defense…

4 months, 2 weeks ago

Short Long
View Episode
M365 Social Engineering Attacks: Why Your Microsoft 365 Security Fails Against Pretexting in Teams
M365 Social Engineering Attacks: Why Your Microsoft 365 Security Fails Against Pretexting in Teams

Season 1

(00:00:00) Microsoft 365 Security Alert
(00:00:06) The Weakness in MFA
(00:00:52) Case File 1: Teams Phishing Inside the Perimeter
(00:02:02) Correct…

4 months, 2 weeks ago

Short Long
View Episode
Teams Security Hardening: Why Teams Channels Are Not Secure by Default
Teams Security Hardening: Why Teams Channels Are Not Secure by Default

Season 1

(00:00:00) The Importance of Secure Microsoft Teams Configuration
(00:00:43) Case Studies: Guest Access Gone Wrong
(00:02:49) The Truth About Private…

4 months, 2 weeks ago

Short Long
View Episode
Defender XDR Hybrid Security: Why Your “Hybrid Security” Is a Lie
Defender XDR Hybrid Security: Why Your “Hybrid Security” Is a Lie

Season 1

(00:00:00) The Siloed Security Dilemma
(00:00:04) The Rube Goldberg Machine of Security Tools
(00:00:18) The Four Blind Spots of Siloed Security
(00:…

4 months, 2 weeks ago

Short Long
View Episode
M365 Attack Chain: Why Your Microsoft 365 Breach Model Is Wrong
M365 Attack Chain: Why Your Microsoft 365 Breach Model Is Wrong

Season 1

(00:00:00) Mission Briefing: Protecting Against Tenant Breaches
(00:00:41) The Enemy's Tactics: Consent Phishing and Token Theft
(00:04:35) The Attac…

4 months, 3 weeks ago

Short Long
View Episode
Entra ID OAuth Consent Attack: Why Your MFA Is Useless Against Illicit Grants
Entra ID OAuth Consent Attack: Why Your MFA Is Useless Against Illicit Grants

Season 1

(00:00:00) The MFA Illusion
(00:00:00) Consent Bypassing MFA
(00:00:54) The Power of OAuth Consent
(00:02:08) Persistence and Refresh Tokens
(00:02:2…

4 months, 3 weeks ago

Short Long
View Episode
Power BI Report Governance: The Doctrine of Distribution for Truthful Dashboards
Power BI Report Governance: The Doctrine of Distribution for Truthful Dashboards

Season 1

(00:00:00) The Heresy of Manual Sharing
(00:00:42) The Dangers of Scattered Truth
(00:02:26) The Sanctuary of Org Apps
(00:02:57) The Five Pillars of…

4 months, 3 weeks ago

Short Long
View Episode
Excel Is Not a Database: Power Apps Dataverse Migration Explained
Excel Is Not a Database: Power Apps Dataverse Migration Explained

Season 1

(00:00:00) The Excel Dilemma
(00:00:29) The Hidden Dangers of Spreadsheets
(00:02:58) Excel vs. Databases: A Fundamental Difference
(00:04:07) The Th…

4 months, 3 weeks ago

Short Long
View Episode
Conditional Access Policy: Your Conditional Access Has Trust Issues (Here’s How to Fix Them)
Conditional Access Policy: Your Conditional Access Has Trust Issues (Here’s How to Fix Them)

Season 1

(00:00:00) Conditional Access Troubleshooting
(00:00:30) Overbroad Exclusions: The Invisible Leaks
(00:04:56) Device Compliance Gaps: Setting Clear B…

4 months, 3 weeks ago

Short Long
View Episode
LangChain4j Copilot Governance: Y’all Need Governance for AI Agents
LangChain4j Copilot Governance: Y’all Need Governance for AI Agents

Season 1

(00:00:00) AI Governance Challenges in LLMs
(00:00:32) The Prompt Injection Threat
(00:01:10) Output Validation and Tool Registry
(00:02:21) Copilot …

4 months, 3 weeks ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us