AhhVeeDaa is joined by friends & celebrities alike in a podcast like no other.
…
continue reading
Critic pod cast where we give our thoughts and opinions On the latest movies, video games, tv shows, and music
…
continue reading
ControlUp Community Radio: The Premier Podcast for IT Insights and Innovations. Join your host, Douglas Brown, as he engages with the leading minds in the realm of End-User Computing (EUC), Digital Employee Experience (DEX), and the broader desktop computing landscape. Delve into candid conversations that unveil the pulse of the technology world—without any preset script. Our guests, ranging from industry pioneers to key players, share their invaluable experiences, providing you with actiona ...
…
continue reading
XenTegra podcasts are about Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
…
continue reading
Aspiring voice over artist. Travel a lot with work. Please use podcast to fall asleep. Cover art photo provided by Konstantin Planinski on Unsplash: https://unsplash.com/@cosio
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
"Blue Square Security" is a Microsoft Security focused podcast that explores the latest trends and best practices in cybersecurity, led by the Microsoft Digital Security team including in-depth discussions with experts from multiple industry experts and Microsoft partners. Each episode will delve into a different topic, such as cloud security, threat intelligence, or identity and access management, providing listeners with practical insights and actionable advice to help them better protect ...
…
continue reading
An underground podcast based in South Australia hosted by KidCrusher, featuring Music & Movie Reviews, Interviews and skits.
…
continue reading
1
S2 Ep. 4 AVD, End User Experience, EP Security
56:04
56:04
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
56:04
Data Retention and Compliance : Greg and Dave discussed the challenges law firms face with data retention and compliance, especially with large amounts of data from cases and litigation. Dave highlighted the importance of understanding state-specific requirements and balancing data accessibility with cost and performance considerations. State-Speci…
…
continue reading
1
Episode #16 - 1st Year Recap with Jed Ayres, CEO of ControlUp
42:51
42:51
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
42:51
In this milestone episode of ControlUp Community Radio, host Douglas Brown sits down with Jed Ayres, CEO of ControlUp, to reflect on his first year at the helm. In this insightful conversation, Jed shares his key learnings, surprises, and favorite memories from the past year. The discussion dives into tool consolidation, automation success stories,…
…
continue reading
1
Let's talk about passwords!
39:56
39:56
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
39:56
Summary In this episode of the BlueScarity Podcast, hosts Andy Jaw and Adam Brewer discuss the evolution of password guidelines, focusing on the recent updates from NIST and Microsoft. They explore the implications of these changes, emphasizing the importance of understanding human behavior in password security and the need for organizations to ado…
…
continue reading
1
Protect against token theft
34:40
34:40
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
34:40
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the critical topic of token theft in identity management. They discuss the importance of multi-factor authentication (MFA) as a primary defense against identity attacks, the nature of tokens, and how attackers exploit vulnerabilities to steal these token…
…
continue reading
1
BSP Turns 4, WSUS Deprecated, macOS Firewall Woes
40:57
40:57
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
40:57
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer celebrate four years of podcasting, reflecting on their journey and the importance of providing actionable insights to their audience. They discuss the significance of education in technology, particularly in relation to Microsoft products and the recent deprecatio…
…
continue reading
1
Cloud Security - Containers 101 & Defender for Containers
26:59
26:59
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
26:59
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the world of containers, exploring their functionality, differences from virtual machines, and the importance of securing them. They discuss key tools like Docker and Kubernetes, and introduce Microsoft's Defender for Containers as a solution for managin…
…
continue reading
1
IBM's Cost of a Data Breach 2024
48:18
48:18
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
48:18
Summary In this episode, Andy and Adam discuss the key findings from IBM's report on the costs of a data breach in 2024. They cover topics such as the increase in the cost of data breaches, the use of security AI and automation, the cyber skills shortage, the challenges of shadow data, and the importance of insider risk management. They also highli…
…
continue reading
1
Episode #15 - A Conversation with Antony Awaida & Andy Tynes of Apporto
41:45
41:45
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
41:45
Join us for Episode #15 of ControlUp Community Radio, where host Douglas Brown sits down with Antony Awaida, Founder and CEO of Apporto, and Andy Tynes, Head of Sales and Alliances. In this episode, Antony and Andy share the story of Apporto's growth, its leadership in the education sector, and plans to expand into other industries. They discuss Ap…
…
continue reading
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss Entra Suite, a new package from Microsoft that includes various Entra products and solutions. They provide an overview of each component, including Entra Private Access, Entra Internet Access, Entra ID Governance, Entra ID Protection, and Entra Verified ID. They highlight t…
…
continue reading
1
Episode #14 - A Conversation with Benny Tritsch, EUCScore.com
53:16
53:16
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
53:16
Join us for Episode #14 of ControlUp Community Radio, where host Douglas Brown sits down with the renowned Dr. Bernhard Tritsch, also known as "Benny." As a CTP, MVP, vEXPERT, NGCA, VIPP, and leading expert in virtualization and end-user computing, Benny's insights are exclusive. In this episode, he shares the inspiration behind creating the EUCSco…
…
continue reading
1
Where do you get technical training?
40:18
40:18
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
40:18
Summary In this episode, Andy and Adam discuss various resources and methods for getting training and learning about Microsoft and other technology solutions. They cover topics such as official documentation, certification tracks, Ninja training, Microsoft Mechanics, the Tech Community, customer connection programs, building a personal lab, and the…
…
continue reading
1
Episode #13 – Conversation with Trey Baumgardner, ControlUp
37:55
37:55
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
37:55
Join us for Episode #13 of ControlUp Community Radio, where host Douglas Brown talks with Trey Baumgardner, Enterprise Relationship Manager at ControlUp. With a rich history that spans roles at Citrix, AppSense, and IGEL, Trey has navigated the tech landscape remarkably, transitioning from technical roles to sales easily. In this episode, Trey shar…
…
continue reading
1
Trump and NPD Hacked, Microsoft Admin MFA
33:19
33:19
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
33:19
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss several cybersecurity news stories. They cover the hack of the Trump campaign's emails by Iranian hackers, the breach of the National Public Data records, and Microsoft's new requirement for admins to enable multi-factor authentication (MFA). They also touch on the importan…
…
continue reading
1
Cloud Security - Defender for Storage Deep Dive
28:25
28:25
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
28:25
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss Microsoft's Defender for Storage, a cloud-native security solution for Azure Blob Storage, Azure Files, and Azure Data Lake Storage. They highlight the three major impacts on data workloads: malicious file uploads, sensitive data exfiltration, and data corruption. The solut…
…
continue reading
1
New Autopilot Features, Intune Enrollment Attestation, MAM for W365/AVD
24:40
24:40
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
24:40
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss new features and updates in Intune, including autopilot for existing devices, Intune enrollment attestation, and mobile application management (MAM). They explain how autopilot for existing devices allows organizations to enroll on-premise joined devices into autopilot usin…
…
continue reading
1
Episode #12 – Conversation with Niels Kok, Microsoft MVP
47:54
47:54
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
47:54
Join us for Episode #12 of ControlUp Community Radio, where host Douglas Brown sits down with Niels Kok, a Microsoft MVP with over 12 years of experience in Microsoft Cloud solutions. In this episode, Niels shares his insights into the evolving IT landscape and how automation fits. As a freelancer, Niels brings a unique perspective and valuable ins…
…
continue reading
1
Cloud Security - Defender CSPM Deep-Dive
33:09
33:09
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
33:09
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss Defender CSPM (Cloud Security Posture Management). They explain that CSPM is the process of monitoring cloud-based systems and infrastructure for risks and misconfigurations. They highlight the key capabilities of CSPM, including automation, monitoring and managing IaaS, Sa…
…
continue reading
1
Episode #11 - Conversation with Chris Marks, Principal Outbound Product Manager at Parallels
54:20
54:20
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
54:20
Join us in Episode #11 of ControlUp Community Radio, where your host, Douglas Brown, welcomes Chris Marks, Principal Outbound Product Manager at Parallels. Chris and Douglas dive into the exciting and evolving world of EUC (End-User Computing), exploring what it means for the industry and for Parallels. They discuss Chris' unique role at Parallels,…
…
continue reading
1
CrowdStrike Major Incident
50:04
50:04
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
50:04
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss the aftermath of the CrowdStrike failed software update. They express empathy for those impacted by the incident and discuss the importance of collaboration in the cybersecurity industry. They also explore the need for transparency from security vendors and the potential im…
…
continue reading
1
Episode #10 - Conversation with Yoni Avital, Co-founder and COO of ControlUp
45:33
45:33
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
45:33
Join us in Episode #10 of ControlUp Community Radio, where your host, Douglas Brown, welcomes Yoni Avital, the Co-founder and COO of ControlUp. Yoni and Douglas discuss the exciting changes at ControlUp, the evolving DEX market, and innovations on the horizon. They delve into the strategic vision driving ControlUp's growth and how the company is se…
…
continue reading
Summary In this episode, Andy and Adam discuss a blog post titled 'Cybersecurity is Full' that challenges the hype around cybersecurity careers. They explore the saturation of the field, the value of certifications and conferences, the optional nature of cybersecurity in organizations, and the stress and challenges of the industry. They emphasize t…
…
continue reading
1
Episode #9 - Conversation with Simon Townsend, ControlUp Field CTO - Part 2
55:35
55:35
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
55:35
Join us in Episode #9 of ControlUp Community Radio, where your host, Douglas Brown, welcomes Simon Townsend, the Field CTO of ControlUp. In this insightful episode, Simon shares his journey over the past six months since his first day on the job, offering a fascinating look into his daily responsibilities and the evolving landscape of the EUC marke…
…
continue reading
1
Cloud Security - Defender for Servers Deep-Dive
34:52
34:52
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
34:52
In this episode of the Blue Security Podcast, Andy and Adam discuss Defender for Servers, a cloud security solution offered by Microsoft. They explain that Defender for Servers is part of the larger Defender for Cloud umbrella and is designed to protect cloud infrastructure, specifically servers. They discuss the different plans available, includin…
…
continue reading
1
Recommended EOP and MDO settings
39:18
39:18
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
39:18
In this episode of the Blue Security Podcast, Andy and Adam discuss recommended settings for Exchange Online Protection (EOP) and Microsoft Defender for Office (MDO). They explain that EOP is the core security for M365 subscriptions, providing anti-malware, anti-spam, and anti-phishing protection. They also highlight the importance of the secure by…
…
continue reading
1
Arlington BEC, Kaspersky Ban, Crown Equipment Cyberattack
37:34
37:34
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
37:34
In this episode, Andy and Adam discuss three cybersecurity news stories. They talk about a small town in Massachusetts that lost over $445,000 in an email scam, the Biden administration's ban on Kaspersky antivirus software, and a cyber attack on Crown Equipment, a forklift manufacturer. The main takeaways from the conversation are the importance o…
…
continue reading
1
Snowflake, Findlay Auto Ransomware, Olympics
32:03
32:03
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
32:03
In this episode of the Blue Security Podcast, Andy and Adam discuss three main topics: the unauthorized user access at Snowflake, the cybersecurity issue at Finley Automotive Group, and the cyber threats surrounding the upcoming Olympics in Paris. They highlight the importance of implementing strong security controls like multi-factor authenticatio…
…
continue reading
1
Microsoft Recall update, Windows Hello Enhanced Sign-in Security
42:07
42:07
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
42:07
In this episode, Andy and Adam discuss the updates and clarifications made by Microsoft regarding the security concerns surrounding the Recall feature on Copilot Plus PCs. They highlight the changes, such as the option to proactively enable Recall during the out-of-box experience, the requirement of Windows Hello enrollment and proof of presence fo…
…
continue reading
1
Ticketmaster breach, Slack AI, Microsoft Recall
29:21
29:21
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
29:21
The conversation covers three primary themes: Ticketmaster data breach, Slack's data scraping, and Windows Recall feature. The Ticketmaster breach is discussed in detail, highlighting the stolen data, phishing risks, and the importance of password management. The conversation then shifts to Slack's data scraping controversy, addressing concerns abo…
…
continue reading
In this episode of the Blue Security Podcast, Andy and Adam discuss the security and privacy announcements from Microsoft Build. They cover topics such as AI content safety, Copilot capabilities, security enhancements in Microsoft Edge, and new Windows security features. They also touch on the deprecation of NTLM and the introduction of Copilot Plu…
…
continue reading
1
Entra Private Access, Endpoint Privilege Management
19:42
19:42
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
19:42
In this episode of the Blue Security Podcast, Andy and Adam discuss Microsoft Entra Private Access and Endpoint Privilege Management. Entra Private Access is a modern secure edge solution that allows remote users to access on-premise applications in a micro-segmented manner. It enables granular app segmentation, MFA, and privileged access to domain…
…
continue reading
1
MSRC Transparency and USB Threats
29:13
29:13
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
29:13
In this episode of the Blue Security Podcast, Andy and Adam discuss two important topics: Microsoft's pledge for greater transparency in identifying and determining root causes for security vulnerabilities, and the increasing sophistication of USB malware attacks in industrial organizations. They provide insights into Microsoft's Secure Future Init…
…
continue reading
1
2024 Verizon Data Breach Report
33:39
33:39
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
33:39
The 17th annual Verizon Data Breach Investigation Report reveals key findings and trends in cybersecurity. The report highlights the increase in vulnerability exploitation for initial access, the continued prevalence of human error in breaches, the rise of pure extortion attacks, and the limited impact of generative AI in the cybersecurity landscap…
…
continue reading
In this episode, Andy and Adam discuss the growing threat of mobile device threats. They highlight the recent mass password reset and account lockout of Apple IDs and the potential for a mobile wormable event. They explore the conditions necessary for a mobile wormable attack, including the development of zero-click exploits, the abuse of contact l…
…
continue reading
1
VDI and Shared Responsibility Model
25:47
25:47
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
25:47
In this episode, Andy and Adam discuss the importance of VDI (Virtual Desktop Infrastructure) in security and enterprise architecture. They highlight the security benefits of VDI, such as separating end user environments from the underlying physical hardware, centralized management of baseline images and patches, and the ability to keep sensitive d…
…
continue reading
1
Entra Follow-up, Helpdesk Security, Certifications
33:31
33:31
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
33:31
In this episode, Andy and Adam clarify some points from the previous episode and discuss two main topics: mitigating social engineering attacks on IT help desks and the value of certifications in cybersecurity. They provide practical tips for securing IT help desks, such as requiring callbacks, video verifications, and supervisor verification. They…
…
continue reading
1
Managed Machines, E3 vs E5
28:57
28:57
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
28:57
In this episode of the Blue Security Podcast, Andy Jaw and Adam Brewer discuss two main topics: the importance of managed devices for improving security posture and the bundling of security solutions in Microsoft licensing. They highlight the shift towards requiring Intune and Azure AD joined devices for improved device management and security. The…
…
continue reading
1
Teams External User Phishing
36:00
36:00
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
36:00
This episode of the Blue Security Podcast discusses the issue of finding logs for chats between external and internal users in Microsoft Teams. The hosts explore various methods for detecting and alerting on suspicious chats, including using KQL queries, creating workbooks, and leveraging communication compliance features. They also highlight the c…
…
continue reading
Interviewing Simon Strain, a Microsoft CSAM (Customer Success Account Manager). We discuss: support, AI, Berst of Breed vs. Best of Platform, MTC, Zero Trust, Microsoft Dart and much more. Thank you for tuning in.Greg Wartes, David Driggers, Michael Vitale által
…
continue reading
1
Midnight Blizzard Update, CISO Technical Skills, BEC + Automatic Attack Disruption
30:53
30:53
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
30:53
This episode covers updates on the Midnight Blizzard attack, the role of CISOs and their technical expertise, the need for international standards in cyber warfare, and defending against business email compromise. Takeaways -Microsoft provides an update on the Midnight Blizzard attack, revealing attempts to gain unauthorized access to internal syst…
…
continue reading
This episode of the Blue Security Podcast covers the announcements made at Microsoft Secure, focusing on Microsoft Copilot for Security, Microsoft Security Exposure Management, and updates to Microsoft Purview and Intune. The episode also highlights the integration of Copilot with Intune and the economic study that demonstrates the increased effici…
…
continue reading
1
FBI Internet Crimes Report and BEC Protection
25:29
25:29
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
25:29
In this episode, the hosts discuss the FBI's 2023 internet crime report, focusing on the increase in money lost to internet crimes and the age group most vulnerable to cybercrime. They then delve into the topic of business email compromise (BEC), explaining how scammers use email to trick individuals and businesses into giving money or divulging co…
…
continue reading
1
Season 2; Ep. 2 (Defender for Cloud)
41:24
41:24
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
41:24
2024's first episode is with award winning partner Difenda and we are talking Defender for Cloud. #Automation #CloudSecurity #CyberSecurityMaturityModel #Defender #DifendaGreg Wartes, David Driggers, Michael Vitale által
…
continue reading
1
Application Allow Listing, iMessage Post Quantum
32:28
32:28
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
32:28
Summary In this episode, Andy and Adam discuss the concept of application allow listing and the controversy surrounding the removal of Wireshark from company computers. They also delve into the announcement by Apple that iMessage is moving to post-quantum level 3 encryption, making it one of the most secure messaging apps available. The hosts highl…
…
continue reading
1
Edge Password Vault, SSO, Domain Admin Creds
34:43
34:43
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
34:43
Summary In this episode, the hosts discuss the Edge password vault and its pros and cons. They highlight the ability to sync passwords to an enterprise ID and the encryption of passwords on the disk. However, they also mention limitations such as the lack of MFA support and the inability to share passwords. The conversation then shifts to best prac…
…
continue reading
1
Bitlocker Bypass and USAF Re-org
31:53
31:53
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
31:53
In this episode, Andy and Adam discuss a video demonstrating how to bypass BitLocker encryption and the mitigations that can be implemented to protect against such attacks. They emphasize the importance of information protection and how it can enhance data security. Additionally, they highlight the reorganization of the US Air Force Cyber Command, …
…
continue reading
1
Episode #8 - A Conversation with Guy Leech, CTP, MVP, & VIPP
1:08:08
1:08:08
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:08:08
Join us in Episode #8 of ControlUp Community Radio, where your host, Douglas Brown, welcomes Guy Leech, a distinguished CTP, MVP, and VIPP. In this engaging episode, Guy shares his extensive experience and insights on the role of scripting in EUC (End-User Computing) and ControlUp, along with his thoughts on how AI will disrupt the industry. With h…
…
continue reading
1
Microsoft Sentinel Deep-Dive with Henrik Wojcik
48:28
48:28
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
48:28
Summary In this episode, Henrik Wojcik, a Microsoft MVP, joins the hosts to discuss Microsoft Sentinel and provide a deep dive into its deployment and usage. They cover topics such as data residency and compliance considerations, separating operational logs and security logs, connectors for data ingestion, analytics rules and alert fatigue, schedul…
…
continue reading
1
Episode #7 - Conversation with Ryan Ververs-Bijkerk & Eltjo van Gulik from Go-EUC.com
57:54
57:54
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
57:54
In Episode #7 of ControlUp Community Radio, Douglas Brown interviews Ryan Ververs-Bijkerk and Eltjo van Gulik from Go-EUC.com. This podcast delivers an in-depth view of end-user computing (EUC), focusing on the contributions and discoveries of GO-EUC, as well as a thorough examination of user experience and remoting protocols like HDX and ICA. The …
…
continue reading
1
Cloudflare Hacked, Intune Suite, Apple Stolen Device Protection
32:08
32:08
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
32:08
Summary In this episode, the hosts discuss the Cloudflare and Okta breach, the response and remediation efforts, the introduction of the Intune Suite, and the new stolen device protection feature on the iPhone. Takeaways Nation-state attackers have unlimited time to find weaknesses and exploit them, highlighting the asymmetrical nature of cybersecu…
…
continue reading
1
Midnight Blizzard Attack on Microsoft
29:12
29:12
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
29:12
Summary In this episode, the hosts discuss the midnight blizzard attack on Microsoft and the lessons that can be learned from it. They cover topics such as learning from security incidents at other organizations, the details of the attack, OAuth attacks, and OAuth security recommendations. The hosts emphasize the importance of auditing privileges, …
…
continue reading