Blue Security
Episodes
Our 2026 Predictions
30 Dec 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss key cybersecurity predictions for 2026, focusing on the rise of agent...
Introducing the BSP Maturity Model for Identity
23 Dec 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the Security Maturity Model, focusing on identity security. They expl...
Microsoft Bug Bounty, CISA hiring surge, US goes offensive in cyber ops, OWASP Top 10
16 Dec 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in cybersecurity, including Microsoft's overh...
Salt Typhoon - The Growing China Threat
09 Dec 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the growing cybersecurity threat posed by the Chinese state-sponso...
Chat app vulnerabilities, Use AI or else
02 Dec 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss vulnerabilities in popular chat applications, particularly focusing o...
2025 Microsoft Ignite Recap for Security
25 Nov 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the major announcements from Microsoft Ignite, focusing on the introd...
Unencrypted Satellite Data, China AI Cyberattack
18 Nov 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Adam Brewer and Andy discuss critical issues surrounding satellite security, particularly t...
How Face ID Works, Least Private Browser, Ring and Flock
11 Nov 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the intricate relationship between privacy and security, particula...
Microsoft Digital Defense Report 2025
04 Nov 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss Microsoft's Digital Defense Report for 2025. The conve...
F5 Breached, Windows 10 EOL, AWS Outage
28 Oct 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss significant recent cybersecurity events, including the F5 ...
What's new in Microsoft Sentinel
21 Oct 2025
Contributed by Lukas
SummaryIn this episode, Andy Jaw and Adam Brewer discuss the latest updates in Microsoft Sentinel, focusing on the new features such as the Sentinel D...
WhatsApp banned; Discord, TransUnion, Jaguar-Land Rover hacked
14 Oct 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss various topics related to cybersecurity, including the sec...
iPhone MIE, Microsoft - Israel MOD, npm supply chain attacks
07 Oct 2025
Contributed by Lukas
SummaryIn this episode, hosts Andy Jaw and Adam Brewer discuss the newly announced iPhone 17 and its enhanced security features, particularly the memo...
Kerberoasting in 2025
30 Sep 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the topic of Kerberosting, a known attack method that e...
Advanced Data Protection with Special Guest Amren Gill
23 Sep 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam celebrate their five-year anniversary with guest Amren Gill, a data security ...
Entra News
16 Sep 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the latest developments in Microsoft security technologies...
FUD and Passkeys
09 Sep 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the concept of FUD (Fear, Uncertainty, and Doubt) prevalent in the...
Microsoft Licensing Overview - Part 3 - Niche Situations and Azure
02 Sep 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the complexities of Microsoft licensing, focusing on de...
Microsoft Licensing Overview - Part 2
26 Aug 2025
Contributed by Lukas
SummaryThe hosts, Andy and Adam, delve into the nuances of licensing models, particularly focusing on the differences between frontline and informatio...
Microsoft Security Licensing Part 1
19 Aug 2025
Contributed by Lukas
SummaryHosts Andy and Adam discuss the structure of enterprise agreements, the differences between Office 365 and Microsoft 365, and the transition fr...
Shadow AI is already happening -- now what?
12 Aug 2025
Contributed by Lukas
SummaryIn this episode, Adam and Andy discuss various topics including Instagram's location sharing capabilities and the implications of AI in the...
Palo Alto acquires Cyberark, Sentinel News, MDTI is going to be FREE!
05 Aug 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant developments in the cybersecurity landscape, including Pa...
SharePoint Server, Help Desk Security, Terminating IT Admins
29 Jul 2025
Contributed by Lukas
SummaryIn this episode, Adam Brewer and Andy Jaw discuss recent SharePoint vulnerabilities, the importance of data protection and governance, and the ...
Power grid vulnerabilities, To Catch a Thief, AI Bug Hunter
22 Jul 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the vulnerabilities in solar technology, particularly focusing on sma...
Windows Kernel & AV/EDR, BSOD Rebrand, Easier 3rd Party Updates
15 Jul 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates from Microsoft, focusing on security enhancements...
Applying "Assume Breach" to Layoffs
08 Jul 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the recent layoffs at Microsoft and the broader implications for the ...
CIAM Deployment Guide; external authentication methods
01 Jul 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the intricacies of Entra External ID, a customer identity and acce...
Securing AI Agents; Using AI Agents for Security
24 Jun 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the emerging concept of AI agents, their implications for security, a...
JP Morgan's CISO open letter, Microsoft & Crowdstrike working together on threat intel
17 Jun 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the implications of JP Morgan's open letter to SaaS vendors, emph...
Microsoft Deputy CISOs, Defending Identity Attacks
10 Jun 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the formation and function of the Cybersecurity Governance Council at...
Windows 11 Security Book
03 Jun 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the critical aspects of Windows security, focusing on the recently...
Microsoft News Update
27 May 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss various Microsoft news topics, including the upcoming end of life for...
Microsoft Security Exposure Management
20 May 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into Microsoft's new feature, Security Exposure Management (XSPM). ...
Administrator protection on Windows 11, Multi-tenancy in Unified SOC
13 May 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the new security features of Windows 11, focusing on Ad...
Microsoft's Secure by Design journey - One year of success
06 May 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss Microsoft's Secure Future Initiative (SFI), which aims...
Quick Recovery, Hotpatch, Copilot Podcast
29 Apr 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the new Quick Recovery feature in Windows 11, which automa...
CVE Program under fire, NLRB whistleblower, Microsoft Zero-Day
22 Apr 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss critical updates in cybersecurity, focusing on the funding...
Side-by-Side with Third-Party Products
15 Apr 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the integration of Microsoft Security Solutions with third...
Automatic Attack Disruption with OAuth Protection
08 Apr 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the intricacies of Microsoft's Automatic Attack Dis...
The Signal Incident
01 Apr 2025
Contributed by Lukas
SummaryIn this episode, Andy and Adam discuss a significant breach of sensitive military information that was leaked through a Signal chat involving h...
Entra Conditional Access - Deep Dive
25 Mar 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the intricacies of Microsoft Entra's conditional ac...
3rd Party Vendor or Contractor Access
18 Mar 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the complexities of granting secure access to third-par...
Next-Gen Logging for the Next-Gen SIEM with Special Guest Karl Niblock
11 Mar 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer engage with cybersecurity architect Karl Niblock to discuss the ev...
Defender Experts with Special Guest Raae Wolfram
04 Mar 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer engage with Ray Wolfram, Senior Product Manager for Defender Exper...
UK vs Apple on Encryption, MITRE Eval results, How to Rethink Phishing Simulations
25 Feb 2025
Contributed by Lukas
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the ongoing battle between governments and tech companies ...
FBI warns about unencrypted messaging, Deepseek discussion
18 Feb 2025
Contributed by Lukas
SummaryIn this episode, Andy and Adam discuss the evolution of messaging security, focusing on end-to-end encryption and the implications of RCS messa...
CISA guidance on securing CI/CD pipelines
11 Feb 2025
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the importance of securing CI/CD environments, highlighti...
Microsoft Fasttrack with Special Guest Thomas Finney
04 Feb 2025
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss Microsoft FastTrack with guest Thomas Finney. They explor...
Microsoft Industry Solutions Delivery with Special Guest Brodie Cassell
28 Jan 2025
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, host Andy Jaw and co-host Adam Brewer welcome Brodie Cassell, a principal security consultant at...
CISA zero trust, macOS malware, IRS PIN, Cyber Trust Mark
21 Jan 2025
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the Zero Trust Maturity Model and its implications for or...
CISA SCuBA Project
14 Jan 2025
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the latest cybersecurity trends, focusing on CISA's Scuba...
Sophos, Digital License Plates, TP-Link, Github Copilot
07 Jan 2025
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss significant cybersecurity updates, including the indictme...
Cloud Security - Defender for ARM, DNS, and AI Workloads
31 Dec 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the latest developments in Azure cloud security, focusing...
Cloud Security - Defender for App Service and Defender for Databases
24 Dec 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the importance of cloud security, focusing on Microsoft's...
Cloud Security - Defender for Key Vault and Defender for API
17 Dec 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into Azure Key Vault and its security features, particularl...
Options for Microsoft training
10 Dec 2024
Contributed by Lukas
Summary In this episode, Andy and Adam discuss various resources available for training on Microsoft technologies. They emphasize the importance of th...
2024 Ignite Recap
03 Dec 2024
Contributed by Lukas
Summary In this episode, hosts Andy and Adam recap the key announcements from Microsoft Ignite, focusing on new features in Microsoft Edge, enhancemen...
CMMC with Special Guest Justin Orcutt
26 Nov 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer welcome Justin Orcutt from Microsoft to discuss the Cybersecurity...
T-Mobile Breach, Sophos hacks back, Bluesky surges
19 Nov 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the recent T-Mobile breach attributed to Chinese state-sp...
Securing contingent workers
12 Nov 2024
Contributed by Lukas
Summary In this episode, Andy and Adam discuss the challenges and strategies for securing seasonal and contingent workers using a Zero Trust approach....
Offboarding employees
05 Nov 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the critical steps involved in offboarding employees, par...
Detecting AD Compromise, Safe MDE Deployment, macOS SSO
29 Oct 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss critical cybersecurity insights, focusing on Active Direc...
2024 Microsoft's Digital Defense Report
22 Oct 2024
Contributed by Lukas
Summary In this episode, Andy and Adam discuss Microsoft's 2024 Digital Defense Report, which highlights the evolving cyber threat landscape, the rise...
Secure Future Initiative Update
15 Oct 2024
Contributed by Lukas
Summary In this episode, Andy Jaw and Adam Brewer discuss Microsoft's Secure Future Initiative (SFI), which emphasizes security by design, default, an...
Let's talk about passwords!
08 Oct 2024
Contributed by Lukas
Summary In this episode of the BlueScarity Podcast, hosts Andy Jaw and Adam Brewer discuss the evolution of password guidelines, focusing on the recen...
Protect against token theft
01 Oct 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the critical topic of token theft in identity manageme...
BSP Turns 4, WSUS Deprecated, macOS Firewall Woes
24 Sep 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer celebrate four years of podcasting, reflecting on their journey a...
Cloud Security - Containers 101 & Defender for Containers
17 Sep 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the world of containers, exploring their functionality...
IBM's Cost of a Data Breach 2024
10 Sep 2024
Contributed by Lukas
Summary In this episode, Andy and Adam discuss the key findings from IBM's report on the costs of a data breach in 2024. They cover topics such as...
Entra Suite Overview
03 Sep 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss Entra Suite, a new package from Microsoft that includes various Entra prod...
Where do you get technical training?
27 Aug 2024
Contributed by Lukas
Summary In this episode, Andy and Adam discuss various resources and methods for getting training and learning about Microsoft and other technology so...
Trump and NPD Hacked, Microsoft Admin MFA
20 Aug 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss several cybersecurity news stories. They cover the hack of the Trump campa...
Cloud Security - Defender for Storage Deep Dive
13 Aug 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss Microsoft's Defender for Storage, a cloud-native security solution for...
New Autopilot Features, Intune Enrollment Attestation, MAM for W365/AVD
06 Aug 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss new features and updates in Intune, including autopilot for existing devic...
Cloud Security - Defender CSPM Deep-Dive
30 Jul 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss Defender CSPM (Cloud Security Posture Management). They explain that CSPM ...
CrowdStrike Major Incident
22 Jul 2024
Contributed by Lukas
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss the aftermath of the CrowdStrike failed software update. They express empa...
Cybersecurity is full?
16 Jul 2024
Contributed by Lukas
Summary In this episode, Andy and Adam discuss a blog post titled 'Cybersecurity is Full' that challenges the hype around cybersecurity career...
Cloud Security - Defender for Servers Deep-Dive
09 Jul 2024
Contributed by Lukas
In this episode of the Blue Security Podcast, Andy and Adam discuss Defender for Servers, a cloud security solution offered by Microsoft. They explain...
Recommended EOP and MDO settings
02 Jul 2024
Contributed by Lukas
In this episode of the Blue Security Podcast, Andy and Adam discuss recommended settings for Exchange Online Protection (EOP) and Microsoft Defender f...
Arlington BEC, Kaspersky Ban, Crown Equipment Cyberattack
25 Jun 2024
Contributed by Lukas
In this episode, Andy and Adam discuss three cybersecurity news stories. They talk about a small town in Massachusetts that lost over $445,000 in an e...
Snowflake, Findlay Auto Ransomware, Olympics
18 Jun 2024
Contributed by Lukas
In this episode of the Blue Security Podcast, Andy and Adam discuss three main topics: the unauthorized user access at Snowflake, the cybersecurity is...
Microsoft Recall update, Windows Hello Enhanced Sign-in Security
11 Jun 2024
Contributed by Lukas
In this episode, Andy and Adam discuss the updates and clarifications made by Microsoft regarding the security concerns surrounding the Recall feature...
Ticketmaster breach, Slack AI, Microsoft Recall
04 Jun 2024
Contributed by Lukas
The conversation covers three primary themes: Ticketmaster data breach, Slack's data scraping, and Windows Recall feature. The Ticketmaster breach...
Microsoft Build Recap
28 May 2024
Contributed by Lukas
In this episode of the Blue Security Podcast, Andy and Adam discuss the security and privacy announcements from Microsoft Build. They cover topics suc...
Entra Private Access, Endpoint Privilege Management
21 May 2024
Contributed by Lukas
In this episode of the Blue Security Podcast, Andy and Adam discuss Microsoft Entra Private Access and Endpoint Privilege Management. Entra Private Ac...
MSRC Transparency and USB Threats
14 May 2024
Contributed by Lukas
In this episode of the Blue Security Podcast, Andy and Adam discuss two important topics: Microsoft's pledge for greater transparency in identifyi...
2024 Verizon Data Breach Report
07 May 2024
Contributed by Lukas
The 17th annual Verizon Data Breach Investigation Report reveals key findings and trends in cybersecurity. The report highlights the increase in vulne...
Mobile Threats
30 Apr 2024
Contributed by Lukas
In this episode, Andy and Adam discuss the growing threat of mobile device threats. They highlight the recent mass password reset and account lockout ...
VDI and Shared Responsibility Model
22 Apr 2024
Contributed by Lukas
In this episode, Andy and Adam discuss the importance of VDI (Virtual Desktop Infrastructure) in security and enterprise architecture. They highlight ...
Entra Follow-up, Helpdesk Security, Certifications
16 Apr 2024
Contributed by Lukas
In this episode, Andy and Adam clarify some points from the previous episode and discuss two main topics: mitigating social engineering attacks on IT ...
Managed Machines, E3 vs E5
09 Apr 2024
Contributed by Lukas
In this episode of the Blue Security Podcast, Andy Jaw and Adam Brewer discuss two main topics: the importance of managed devices for improving securi...
Teams External User Phishing
02 Apr 2024
Contributed by Lukas
This episode of the Blue Security Podcast discusses the issue of finding logs for chats between external and internal users in Microsoft Teams. The ho...
Midnight Blizzard Update, CISO Technical Skills, BEC + Automatic Attack Disruption
26 Mar 2024
Contributed by Lukas
This episode covers updates on the Midnight Blizzard attack, the role of CISOs and their technical expertise, the need for international standards in ...
Microsoft Secure Recap
19 Mar 2024
Contributed by Lukas
This episode of the Blue Security Podcast covers the announcements made at Microsoft Secure, focusing on Microsoft Copilot for Security, Microsoft Sec...
FBI Internet Crimes Report and BEC Protection
12 Mar 2024
Contributed by Lukas
In this episode, the hosts discuss the FBI's 2023 internet crime report, focusing on the increase in money lost to internet crimes and the age gro...
Application Allow Listing, iMessage Post Quantum
05 Mar 2024
Contributed by Lukas
Summary In this episode, Andy and Adam discuss the concept of application allow listing and the controversy surrounding the removal of Wireshark from...
Edge Password Vault, SSO, Domain Admin Creds
27 Feb 2024
Contributed by Lukas
Summary In this episode, the hosts discuss the Edge password vault and its pros and cons. They highlight the ability to sync passwords to an enterpris...
Bitlocker Bypass and USAF Re-org
20 Feb 2024
Contributed by Lukas
In this episode, Andy and Adam discuss a video demonstrating how to bypass BitLocker encryption and the mitigations that can be implemented to protect...
Microsoft Sentinel Deep-Dive with Henrik Wojcik
13 Feb 2024
Contributed by Lukas
Summary In this episode, Henrik Wojcik, a Microsoft MVP, joins the hosts to discuss Microsoft Sentinel and provide a deep dive into its deployment and...
Cloudflare Hacked, Intune Suite, Apple Stolen Device Protection
06 Feb 2024
Contributed by Lukas
Summary In this episode, the hosts discuss the Cloudflare and Okta breach, the response and remediation efforts, the introduction of the Intune Suite,...