Podcast Episodes
Back to Search
M365 Audit Logs Zero Trust: The Microsoft 365 Audit Logs You’re Ignoring
Season 1
(00:00:00) Zero Trust and Log Analysis
(00:00:21) The Importance of Continuous Monitoring
(00:00:37) Identity Verification: The First Line of Defense…
4 months, 2 weeks ago
M365 Social Engineering Attacks: Why Your Microsoft 365 Security Fails Against Pretexting in Teams
Season 1
(00:00:00) Microsoft 365 Security Alert
(00:00:06) The Weakness in MFA
(00:00:52) Case File 1: Teams Phishing Inside the Perimeter
(00:02:02) Correct…
4 months, 2 weeks ago
Teams Security Hardening: Why Teams Channels Are Not Secure by Default
Season 1
(00:00:00) The Importance of Secure Microsoft Teams Configuration
(00:00:43) Case Studies: Guest Access Gone Wrong
(00:02:49) The Truth About Private…
4 months, 2 weeks ago
Defender XDR Hybrid Security: Why Your “Hybrid Security” Is a Lie
Season 1
(00:00:00) The Siloed Security Dilemma
(00:00:04) The Rube Goldberg Machine of Security Tools
(00:00:18) The Four Blind Spots of Siloed Security
(00:…
4 months, 2 weeks ago
M365 Attack Chain: Why Your Microsoft 365 Breach Model Is Wrong
Season 1
(00:00:00) Mission Briefing: Protecting Against Tenant Breaches
(00:00:41) The Enemy's Tactics: Consent Phishing and Token Theft
(00:04:35) The Attac…
4 months, 3 weeks ago
Entra ID OAuth Consent Attack: Why Your MFA Is Useless Against Illicit Grants
Season 1
(00:00:00) The MFA Illusion
(00:00:00) Consent Bypassing MFA
(00:00:54) The Power of OAuth Consent
(00:02:08) Persistence and Refresh Tokens
(00:02:2…
4 months, 3 weeks ago
Power BI Report Governance: The Doctrine of Distribution for Truthful Dashboards
Season 1
(00:00:00) The Heresy of Manual Sharing
(00:00:42) The Dangers of Scattered Truth
(00:02:26) The Sanctuary of Org Apps
(00:02:57) The Five Pillars of…
4 months, 3 weeks ago
Excel Is Not a Database: Power Apps Dataverse Migration Explained
Season 1
(00:00:00) The Excel Dilemma
(00:00:29) The Hidden Dangers of Spreadsheets
(00:02:58) Excel vs. Databases: A Fundamental Difference
(00:04:07) The Th…
4 months, 3 weeks ago
Conditional Access Policy: Your Conditional Access Has Trust Issues (Here’s How to Fix Them)
Season 1
(00:00:00) Conditional Access Troubleshooting
(00:00:30) Overbroad Exclusions: The Invisible Leaks
(00:04:56) Device Compliance Gaps: Setting Clear B…
4 months, 3 weeks ago
LangChain4j Copilot Governance: Y’all Need Governance for AI Agents
Season 1
(00:00:00) AI Governance Challenges in LLMs
(00:00:32) The Prompt Injection Threat
(00:01:10) Output Validation and Tool Registry
(00:02:21) Copilot …
4 months, 3 weeks ago