Menu
Sign In Search Podcasts Libraries Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Blue Security

Technology

Episodes

Showing 1-100 of 314
Page 1 of 4 Next → »»

You Can't Patch Fast Enough: Exchange Zero-Day and Tycoon2FA Strike

19 May 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss two significant topics: Agent 365, a new dashboard for mon...

You Can't Patch Fast Enough: Exchange Zero-Day and Tycoon2FA Strike

19 May 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss two significant topics: Agent 365, a new dashboard for mon...

Lockdown Mode Success, Howler Cell, and Entra Conditional Access

12 May 2026

Contributed by Lukas

SummaryThis episode covers Apple Lockdown Mode's effectiveness against spyware, the Phantom Device attack exploiting Azure AD, and best practices ...

Lockdown Mode Success, Howler Cell, and Entra Conditional Access

11 May 2026

Contributed by Lukas

SummaryThis episode covers Apple Lockdown Mode's effectiveness against spyware, the Phantom Device attack exploiting Azure AD, and best practices ...

Copy Fail, Claude Security, and Microsoft's AI Defense Playboo

05 May 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss significant topics in cybersecurity, including the discove...

Copy Fail, Claude Security, and Microsoft's AI Defense Playbook

05 May 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss significant topics in cybersecurity, including the discove...

Apple-Signal Bug, NCSC recommends passkeys, Open Source debate

28 Apr 2026

Contributed by Lukas

SummaryIn this episode, Andy and Adam discuss a recent vulnerability in the Signal messaging app that allowed the FBI to recover deleted messages from...

Apple-Signal Bug, NCSC recommends passkeys, Open Source debate

28 Apr 2026

Contributed by Lukas

SummaryIn this episode, Andy and Adam discuss a recent vulnerability in the Signal messaging app that allowed the FBI to recover deleted messages from...

Ep 292 - NIST Taps Out, $21B Lost in cybercrime, and MDI Password Protection

21 Apr 2026

Contributed by Lukas

SummaryIn this episode, Andy and Adam discuss significant changes in cybersecurity, focusing on NIST's new policy for handling CVEs, the alarming ...

NIST Taps Out, $21B Lost in cybercrime, and MDI Password Protection

21 Apr 2026

Contributed by Lukas

SummaryIn this episode, Andy and Adam discuss significant changes in cybersecurity, focusing on NIST's new policy for handling CVEs, the alarming ...

Hack the Planet, Ban the Router: Your Weekly Dose of Cyber Chaos

14 Apr 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the recent FCC ban on foreign-made routers, citing national security ...

Hack the Planet, Ban the Router: Your Weekly Dose of Cyber Chaos

14 Apr 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the recent FCC ban on foreign-made routers, citing national security ...

Claude code leak and Axios NPM Supply Chain attack

07 Apr 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant cybersecurity incidents, including a cloud code leak from...

Claude code leak and Axios NPM Supply Chain attack

07 Apr 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant cybersecurity incidents, including a cloud code leak from...

Small Business Security from a MSP Perspective

31 Mar 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss various aspects of cybersecurity, particularly focusing on small busi...

Small Business Security from a MSP Perspective

31 Mar 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss various aspects of cybersecurity, particularly focusing on small busi...

Microsoft Frontier Suite (E7)

24 Mar 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the newly announced E7 Frontier Suite from Microsoft, which consolida...

Microsoft Frontier Suite (E7)

24 Mar 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the newly announced E7 Frontier Suite from Microsoft, which consolida...

Spies, Wipes, and AI Gripes

17 Mar 2026

Contributed by Lukas

Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant developments in AI ethics and cybersecurity. They delve ...

Spies, Wipes, and AI Gripes

17 Mar 2026

Contributed by Lukas

Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant developments in AI ethics and cybersecurity. They delve ...

Dial 'F' for Fraud: Uncovering IRSF

16 Mar 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into a significant surge in external ID charges experienced by a custom...

Dial 'F' for Fraud: Uncovering IRSF

10 Mar 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into a significant surge in external ID charges experienced by a custom...

Guardrails or Going Off the Rails: Anthropic vs US Government

03 Mar 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the recent tensions between the U.S. government and the private te...

Guardrails or Going Off the Rails: Anthropic vs US Government

03 Mar 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the recent tensions between the U.S. government and the private te...

ClawdBot, MoltBot, and OpenClaw

24 Feb 2026

Contributed by Lukas

SummaryIn this episode, Adam and Andy explore the security challenges and risks associated with OpenClaw, an AI assistant with extensive system access...

ClawdBot, MoltBot, and OpenClaw

24 Feb 2026

Contributed by Lukas

SummaryIn this episode, Adam and Andy explore the security challenges and risks associated with OpenClaw, an AI assistant with extensive system access...

Notepad++ supply chain compromise and 7-Zip malware

17 Feb 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant cybersecurity incidents involving Notepad++ and 7-Zip, hi...

Notepad++ supply chain compromise and 7-Zip malware

17 Feb 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant cybersecurity incidents involving Notepad++ and 7-Zip, hi...

Do we need phishing sims & Upcoming Intune changes

17 Feb 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the evolving landscape of cybersecurity training, particularly in lig...

Do we need phishing sims & Upcoming Intune changes

10 Feb 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the evolving landscape of cybersecurity training, particularly in lig...

Smartphone Privacy, Know Your Rights

03 Feb 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the intersection of cybersecurity, user rights, and the ev...

Smartphone Privacy, Know Your Rights

03 Feb 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the intersection of cybersecurity, user rights, and the ev...

BSP Maturity Model - Data Security with guest Amren Gill

27 Jan 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam, along with expert Amren Gill, delve into the critical topic of data security...

BSP Maturity Model - Data Security with guest Amren Gill

27 Jan 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam, along with expert Amren Gill, delve into the critical topic of data security...

WEF Security Survey, AI Browsers, NTLMv1

20 Jan 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the latest AI security concerns facing leaders today. T...

LinkedIn job scams and Zero-Click Gemini Vulnerability

13 Jan 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the challenges faced in the job market, particularly the rise of scam...

RC4 Deprecated, Are passkeys still an issue?

06 Jan 2026

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in Microsoft's security protocols, particular...

Our 2026 Predictions

30 Dec 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss key cybersecurity predictions for 2026, focusing on the rise of agent...

Introducing the BSP Maturity Model for Identity

23 Dec 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the Security Maturity Model, focusing on identity security. They expl...

Microsoft Bug Bounty, CISA hiring surge, US goes offensive in cyber ops, OWASP Top 10

16 Dec 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in cybersecurity, including Microsoft's overh...

Salt Typhoon - The Growing China Threat

09 Dec 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the growing cybersecurity threat posed by the Chinese state-sponso...

Chat app vulnerabilities, Use AI or else

02 Dec 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss vulnerabilities in popular chat applications, particularly focusing o...

2025 Microsoft Ignite Recap for Security

25 Nov 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the major announcements from Microsoft Ignite, focusing on the introd...

Unencrypted Satellite Data, China AI Cyberattack

18 Nov 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Adam Brewer and Andy discuss critical issues surrounding satellite security, particularly t...

How Face ID Works, Least Private Browser, Ring and Flock

11 Nov 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the intricate relationship between privacy and security, particula...

Microsoft Digital Defense Report 2025

04 Nov 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss Microsoft's Digital Defense Report for 2025. The conve...

F5 Breached, Windows 10 EOL, AWS Outage

28 Oct 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss significant recent cybersecurity events, including the F5 ...

What's new in Microsoft Sentinel

21 Oct 2025

Contributed by Lukas

SummaryIn this episode, Andy Jaw and Adam Brewer discuss the latest updates in Microsoft Sentinel, focusing on the new features such as the Sentinel D...

WhatsApp banned; Discord, TransUnion, Jaguar-Land Rover hacked

14 Oct 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss various topics related to cybersecurity, including the sec...

iPhone MIE, Microsoft - Israel MOD, npm supply chain attacks

07 Oct 2025

Contributed by Lukas

SummaryIn this episode, hosts Andy Jaw and Adam Brewer discuss the newly announced iPhone 17 and its enhanced security features, particularly the memo...

Kerberoasting in 2025

30 Sep 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the topic of Kerberosting, a known attack method that e...

Advanced Data Protection with Special Guest Amren Gill

23 Sep 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam celebrate their five-year anniversary with guest Amren Gill, a data security ...

Entra News

16 Sep 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the latest developments in Microsoft security technologies...

FUD and Passkeys

09 Sep 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the concept of FUD (Fear, Uncertainty, and Doubt) prevalent in the...

Microsoft Licensing Overview - Part 3 - Niche Situations and Azure

02 Sep 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the complexities of Microsoft licensing, focusing on de...

Microsoft Licensing Overview - Part 2

26 Aug 2025

Contributed by Lukas

SummaryThe hosts, Andy and Adam, delve into the nuances of licensing models, particularly focusing on the differences between frontline and informatio...

Microsoft Security Licensing Part 1

19 Aug 2025

Contributed by Lukas

SummaryHosts Andy and Adam discuss the structure of enterprise agreements, the differences between Office 365 and Microsoft 365, and the transition fr...

Shadow AI is already happening -- now what?

12 Aug 2025

Contributed by Lukas

SummaryIn this episode, Adam and Andy discuss various topics including Instagram's location sharing capabilities and the implications of AI in the...

Palo Alto acquires Cyberark, Sentinel News, MDTI is going to be FREE!

05 Aug 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant developments in the cybersecurity landscape, including Pa...

SharePoint Server, Help Desk Security, Terminating IT Admins

29 Jul 2025

Contributed by Lukas

SummaryIn this episode, Adam Brewer and Andy Jaw discuss recent SharePoint vulnerabilities, the importance of data protection and governance, and the ...

Power grid vulnerabilities, To Catch a Thief, AI Bug Hunter

22 Jul 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the vulnerabilities in solar technology, particularly focusing on sma...

Windows Kernel & AV/EDR, BSOD Rebrand, Easier 3rd Party Updates

15 Jul 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates from Microsoft, focusing on security enhancements...

Applying "Assume Breach" to Layoffs

08 Jul 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the recent layoffs at Microsoft and the broader implications for the ...

CIAM Deployment Guide; external authentication methods

01 Jul 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the intricacies of Entra External ID, a customer identity and acce...

Securing AI Agents; Using AI Agents for Security

24 Jun 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the emerging concept of AI agents, their implications for security, a...

JP Morgan's CISO open letter, Microsoft & Crowdstrike working together on threat intel

17 Jun 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the implications of JP Morgan's open letter to SaaS vendors, emph...

Microsoft Deputy CISOs, Defending Identity Attacks

10 Jun 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the formation and function of the Cybersecurity Governance Council at...

Windows 11 Security Book

03 Jun 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the critical aspects of Windows security, focusing on the recently...

Microsoft News Update

27 May 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss various Microsoft news topics, including the upcoming end of life for...

Microsoft Security Exposure Management

20 May 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into Microsoft's new feature, Security Exposure Management (XSPM). ...

Administrator protection on Windows 11, Multi-tenancy in Unified SOC

13 May 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the new security features of Windows 11, focusing on Ad...

Microsoft's Secure by Design journey - One year of success

06 May 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss Microsoft's Secure Future Initiative (SFI), which aims...

Quick Recovery, Hotpatch, Copilot Podcast

29 Apr 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the new Quick Recovery feature in Windows 11, which automa...

CVE Program under fire, NLRB whistleblower, Microsoft Zero-Day

22 Apr 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss critical updates in cybersecurity, focusing on the funding...

Side-by-Side with Third-Party Products

15 Apr 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the integration of Microsoft Security Solutions with third...

Automatic Attack Disruption with OAuth Protection

08 Apr 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the intricacies of Microsoft's Automatic Attack Dis...

The Signal Incident

01 Apr 2025

Contributed by Lukas

SummaryIn this episode, Andy and Adam discuss a significant breach of sensitive military information that was leaked through a Signal chat involving h...

Entra Conditional Access - Deep Dive

25 Mar 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the intricacies of Microsoft Entra's conditional ac...

3rd Party Vendor or Contractor Access

18 Mar 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the complexities of granting secure access to third-par...

Next-Gen Logging for the Next-Gen SIEM with Special Guest Karl Niblock

11 Mar 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer engage with cybersecurity architect Karl Niblock to discuss the ev...

Defender Experts with Special Guest Raae Wolfram

04 Mar 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer engage with Ray Wolfram, Senior Product Manager for Defender Exper...

UK vs Apple on Encryption, MITRE Eval results, How to Rethink Phishing Simulations

25 Feb 2025

Contributed by Lukas

SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the ongoing battle between governments and tech companies ...

FBI warns about unencrypted messaging, Deepseek discussion

18 Feb 2025

Contributed by Lukas

SummaryIn this episode, Andy and Adam discuss the evolution of messaging security, focusing on end-to-end encryption and the implications of RCS messa...

CISA guidance on securing CI/CD pipelines

11 Feb 2025

Contributed by Lukas

Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the importance of securing CI/CD environments, highlighti...

Microsoft Fasttrack with Special Guest Thomas Finney

04 Feb 2025

Contributed by Lukas

Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss Microsoft FastTrack with guest Thomas Finney. They explor...

Microsoft Industry Solutions Delivery with Special Guest Brodie Cassell

28 Jan 2025

Contributed by Lukas

Summary In this episode of the Blue Security Podcast, host Andy Jaw and co-host Adam Brewer welcome Brodie Cassell, a principal security consultant at...

CISA zero trust, macOS malware, IRS PIN, Cyber Trust Mark

21 Jan 2025

Contributed by Lukas

Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the Zero Trust Maturity Model and its implications for or...

CISA SCuBA Project

14 Jan 2025

Contributed by Lukas

Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the latest cybersecurity trends, focusing on CISA's Scuba...

Sophos, Digital License Plates, TP-Link, Github Copilot

07 Jan 2025

Contributed by Lukas

Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss significant cybersecurity updates, including the indictme...

Cloud Security - Defender for ARM, DNS, and AI Workloads

31 Dec 2024

Contributed by Lukas

Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the latest developments in Azure cloud security, focusing...

Cloud Security - Defender for App Service and Defender for Databases

24 Dec 2024

Contributed by Lukas

Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the importance of cloud security, focusing on Microsoft's...

Cloud Security - Defender for Key Vault and Defender for API

17 Dec 2024

Contributed by Lukas

Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into Azure Key Vault and its security features, particularl...

Options for Microsoft training

10 Dec 2024

Contributed by Lukas

Summary In this episode, Andy and Adam discuss various resources available for training on Microsoft technologies. They emphasize the importance of th...

2024 Ignite Recap

03 Dec 2024

Contributed by Lukas

Summary In this episode, hosts Andy and Adam recap the key announcements from Microsoft Ignite, focusing on new features in Microsoft Edge, enhancemen...

CMMC with Special Guest Justin Orcutt

26 Nov 2024

Contributed by Lukas

Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer welcome Justin Orcutt from Microsoft to discuss the Cybersecurity...

T-Mobile Breach, Sophos hacks back, Bluesky surges

19 Nov 2024

Contributed by Lukas

Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the recent T-Mobile breach attributed to Chinese state-sp...

Securing contingent workers

12 Nov 2024

Contributed by Lukas

Summary In this episode, Andy and Adam discuss the challenges and strategies for securing seasonal and contingent workers using a Zero Trust approach....

Offboarding employees

05 Nov 2024

Contributed by Lukas

Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the critical steps involved in offboarding employees, par...

Detecting AD Compromise, Safe MDE Deployment, macOS SSO

29 Oct 2024

Contributed by Lukas

Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss critical cybersecurity insights, focusing on Active Direc...

2024 Microsoft's Digital Defense Report

22 Oct 2024

Contributed by Lukas

Summary In this episode, Andy and Adam discuss Microsoft's 2024 Digital Defense Report, which highlights the evolving cyber threat landscape, the rise...

Page 1 of 4 Next → »»