Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Blue Security

Technology

Episodes

Showing 101-200 of 298
«« ← Prev Page 2 of 3 Next → »»

Arlington BEC, Kaspersky Ban, Crown Equipment Cyberattack

25 Jun 2024

Contributed by Lukas

In this episode, Andy and Adam discuss three cybersecurity news stories. They talk about a small town in Massachusetts that lost over $445,000 in an e...

Snowflake, Findlay Auto Ransomware, Olympics

18 Jun 2024

Contributed by Lukas

In this episode of the Blue Security Podcast, Andy and Adam discuss three main topics: the unauthorized user access at Snowflake, the cybersecurity is...

Microsoft Recall update, Windows Hello Enhanced Sign-in Security

11 Jun 2024

Contributed by Lukas

In this episode, Andy and Adam discuss the updates and clarifications made by Microsoft regarding the security concerns surrounding the Recall feature...

Ticketmaster breach, Slack AI, Microsoft Recall

04 Jun 2024

Contributed by Lukas

The conversation covers three primary themes: Ticketmaster data breach, Slack's data scraping, and Windows Recall feature. The Ticketmaster breach...

Microsoft Build Recap

28 May 2024

Contributed by Lukas

In this episode of the Blue Security Podcast, Andy and Adam discuss the security and privacy announcements from Microsoft Build. They cover topics suc...

Entra Private Access, Endpoint Privilege Management

21 May 2024

Contributed by Lukas

In this episode of the Blue Security Podcast, Andy and Adam discuss Microsoft Entra Private Access and Endpoint Privilege Management. Entra Private Ac...

MSRC Transparency and USB Threats

14 May 2024

Contributed by Lukas

In this episode of the Blue Security Podcast, Andy and Adam discuss two important topics: Microsoft's pledge for greater transparency in identifyi...

2024 Verizon Data Breach Report

07 May 2024

Contributed by Lukas

The 17th annual Verizon Data Breach Investigation Report reveals key findings and trends in cybersecurity. The report highlights the increase in vulne...

Mobile Threats

30 Apr 2024

Contributed by Lukas

In this episode, Andy and Adam discuss the growing threat of mobile device threats. They highlight the recent mass password reset and account lockout ...

VDI and Shared Responsibility Model

22 Apr 2024

Contributed by Lukas

In this episode, Andy and Adam discuss the importance of VDI (Virtual Desktop Infrastructure) in security and enterprise architecture. They highlight ...

Entra Follow-up, Helpdesk Security, Certifications

16 Apr 2024

Contributed by Lukas

In this episode, Andy and Adam clarify some points from the previous episode and discuss two main topics: mitigating social engineering attacks on IT ...

Managed Machines, E3 vs E5

09 Apr 2024

Contributed by Lukas

In this episode of the Blue Security Podcast, Andy Jaw and Adam Brewer discuss two main topics: the importance of managed devices for improving securi...

Teams External User Phishing

02 Apr 2024

Contributed by Lukas

This episode of the Blue Security Podcast discusses the issue of finding logs for chats between external and internal users in Microsoft Teams. The ho...

Midnight Blizzard Update, CISO Technical Skills, BEC + Automatic Attack Disruption

26 Mar 2024

Contributed by Lukas

This episode covers updates on the Midnight Blizzard attack, the role of CISOs and their technical expertise, the need for international standards in ...

Microsoft Secure Recap

19 Mar 2024

Contributed by Lukas

This episode of the Blue Security Podcast covers the announcements made at Microsoft Secure, focusing on Microsoft Copilot for Security, Microsoft Sec...

FBI Internet Crimes Report and BEC Protection

12 Mar 2024

Contributed by Lukas

In this episode, the hosts discuss the FBI's 2023 internet crime report, focusing on the increase in money lost to internet crimes and the age gro...

Application Allow Listing, iMessage Post Quantum

05 Mar 2024

Contributed by Lukas

Summary In this episode, Andy and Adam discuss the concept of application allow listing and the controversy surrounding the removal of Wireshark from...

Edge Password Vault, SSO, Domain Admin Creds

27 Feb 2024

Contributed by Lukas

Summary In this episode, the hosts discuss the Edge password vault and its pros and cons. They highlight the ability to sync passwords to an enterpris...

Bitlocker Bypass and USAF Re-org

20 Feb 2024

Contributed by Lukas

In this episode, Andy and Adam discuss a video demonstrating how to bypass BitLocker encryption and the mitigations that can be implemented to protect...

Microsoft Sentinel Deep-Dive with Henrik Wojcik

13 Feb 2024

Contributed by Lukas

Summary In this episode, Henrik Wojcik, a Microsoft MVP, joins the hosts to discuss Microsoft Sentinel and provide a deep dive into its deployment and...

Cloudflare Hacked, Intune Suite, Apple Stolen Device Protection

06 Feb 2024

Contributed by Lukas

Summary In this episode, the hosts discuss the Cloudflare and Okta breach, the response and remediation efforts, the introduction of the Intune Suite,...

Midnight Blizzard Attack on Microsoft

30 Jan 2024

Contributed by Lukas

Summary In this episode, the hosts discuss the midnight blizzard attack on Microsoft and the lessons that can be learned from it. They cover topics su...

X accounts hacked, 23andMe revisited, CA for Entitlement Management

23 Jan 2024

Contributed by Lukas

Summary This episode of the Blue Security Podcast discusses the recent Twitter account hacks and the importance of multifactor authentication (MFA) in...

Entra Join is the way

16 Jan 2024

Contributed by Lukas

In this episode, Andy and Adam discuss the transition from hybrid join to cloud native Entra Join for device management. They explain the difference b...

Entra improvements, QR Code phishing, AppGuard deprecated

09 Jan 2024

Contributed by Lukas

In this episode, Andy and Adam discuss updates to the Microsoft Authenticator app, including its phish-resistant capabilities and FIPS compliance. The...

Common PIM mistakes

01 Jan 2024

Contributed by Lukas

In this episode, the hosts discuss Privileged Identity Management (PIM) and common misconceptions and mistakes related to its configuration. They cove...

Microsoft Digital Defense Report 2023

25 Dec 2023

Contributed by Lukas

Microsoft's Digital Defense Report for 2023 provides insights into the state of cybercrime, critical cybersecurity challenges, and the importance ...

Audits and Data/AI Security with Special Guests Carley Salmon and Megan Maley

18 Dec 2023

Contributed by Lukas

On this episode, Adam and Andy talk with Carley and Megan, about compliance, auditing, and data protection in the cybersecurity industry. They emphasi...

CNAPP - Defender for Cloud Overview

11 Dec 2023

Contributed by Lukas

This episode of the Blue Security Podcast discusses the Cloud Native Application Protection Platform (CNAPP) and Microsoft's Defender for Cloud. T...

MeridianLink extortion, Plastic Surgery office breached, AI voice clones

04 Dec 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about a ransomware gang making an SEC complaint against their victim, a medical office breach, and AI v...

Microsoft Ignite 2023 - Part 2

04 Dec 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about more things on security from Microsoft Ignite. From canary capabilities in MDE to Automatic Condi...

Microsoft Ignite 2023 - Part 1

20 Nov 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about all the security announcements from Microsoft Ignite 2023. There were SO many that this will be p...

Okta Breach Follow-up and Passkeys

13 Nov 2023

Contributed by Lukas

On this week's episode, Andy and Adam talk about the follow up investigation from Okta about their support system breach along with some lessons t...

SEC charges Solarwinds CISO & Backing up and Archiving M365 data

12 Nov 2023

Contributed by Lukas

On this week's episode, Andy and Adam talk about the SEC charging the Solarwinds CISO with fraud and the implications on the overall security lead...

23andMe, Okta breach, MDE Automatic Attack Disruption

30 Oct 2023

Contributed by Lukas

On this week's episode, Andy and Adam talk about the 23andMe and Okta breach that happened recently along with some recommendations on how organiz...

Entra Web-sign in, MDE Device Control, Imposter Syndrome

23 Oct 2023

Contributed by Lukas

On this week's episode, Andy and Adam talk about some new features with Entra Web Sign-in and Microsoft Defender for Endpoint Device Control. They...

Conditional Access Gap Analysis

19 Oct 2023

Contributed by Lukas

On this week's episode, Andy and Adam talk about how to think about your conditional access policy design to avoid some common gaps that attackers...

Unpopular Cybersecurity Opinions

09 Oct 2023

Contributed by Lukas

On this week's episode, Andy and Adam talk about a fun Twitter/X thread where cybersecurity professionals expressed some "unpopular opinions....

JCI Ransomware, Ransomware Negotiations, CISA guidance

02 Oct 2023

Contributed by Lukas

On this week's episode, Andy and Adam talk about Johnson Controls' ransomware attack and some implications on national security. They also tal...

MITRE Engenuity ATT&CK Evaluations and Insider Risk

26 Sep 2023

Contributed by Lukas

On this week's episode, Andy and Adam talk about the results of the MITRE Engenuity ATT&CK Evaluations and how to interpret them. They also ta...

MGM Resorts Security Incident

18 Sep 2023

Contributed by Lukas

On this week's episode, Andy and Adam talk about the security incident impacting MGM Resorts. They discuss the attack vector of social engineering...

Apple 0-day's, Storm-0558 follow up, MFST Conditional Access Dashboard

11 Sep 2023

Contributed by Lukas

On this week's episode, Andy and Adam talk about Apple's no-click zero day, the technical findings of the follow up investigation on Storm-055...

Data Security in Microsoft 365

04 Sep 2023

Contributed by Lukas

On this week's episode, Andy and Adam talk about data security in Microsoft 365. They talk about data discovery, data classification, and some of ...

Side channel attack, White House cybersecurity workforce plan, IBM Cost of a Data Breach

28 Aug 2023

Contributed by Lukas

On this week's episode, Andy and Adam catch up some worthy infosec news including a new side channel attack, the White House cybersecurity workfor...

Red Teaming with Special Guest 23P

21 Aug 2023

Contributed by Lukas

On this week's episode, Andy and Adam talk with Michael Belton and Dave Falkenstein from 23p, a Madison, Wisconsin based red-teaming company about...

Securing Entra External Identities

14 Aug 2023

Contributed by Lukas

On this week's episode, Andy and Adam talk about securing Entra external identities. They talk about B2B and B2C as well as a few other lesser kno...

Educating Defenders with Special Guest Howard Friedman, Ascent Solutions

07 Aug 2023

Contributed by Lukas

On this week's episode, Andy and Adam welcome guest Howard Friedman of Ascent Solutions to the program. Howard helps educate our audience of secur...

New SEC and FCC rules, and Samsung device security

31 Jul 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about some new SEC and FCC rules as well as some news on Samsung device security. -------------------...

Expanded M365 audit logs, Threads, new Entra features

24 Jul 2023

Contributed by Lukas

On this week's episode, Adam and Andy follow up on Storm-0558 and how Microsoft is expanding cloud logging as a result of the threat actor. They a...

Storm-0558 - Attack on Exchange Online

17 Jul 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk Storm-0558, the China-based actor, that compromised Exchange Online. They go through the attack chain a...

Common M365 Misconfigurations

10 Jul 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk through Trimarc Security's blog on M365 security misconfigurations. Surprisingly, there are a few t...

What's new with Intune and Entra

03 Jul 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about some new features in Intune and Entra. There are some great features that are in public preview a...

OWASP Top 10 and Top 10 for LLM

26 Jun 2023

Contributed by Lukas

on this week's episode, Adam and Andy talk about the OWASP Top 10 and the Top 10 for Large Language models. It is good for defenders to understand...

Network Security 101

19 Jun 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about the basics of network security. They go over asset management, firewalls, IDS/IPS, NDR's, and...

MSSP's

12 Jun 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about Managed Security Service Providers (MSSP's). They talk about the different levels and service...

Protecting M365 from on-premise attacks

05 Jun 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about Microsoft's guidance on how to protect your M365 environment from on-premises attacks. ------...

Microsoft Build 2023 Recap

30 May 2023

Contributed by Lukas

On this week's episode, Adam and Andy give their perspective on some of the interesting security topics from Microsoft Build 2023. ---------------...

Limiting Chatgpt

22 May 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about how many companies are limiting access to ChatGPT in their corporate assets. They discuss why thi...

Apple Rapid Security, Data Encryption, Layoffs & Insider Risk

15 May 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about Apple's new Rapid Security update for iOS and Android. They also talk about different ways to...

Microsoft Secure Score

08 May 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about one of the most underutilized features of M365: Secure Score. They talk about what it is and go t...

Workplace Join, Azure AD Join, and Windows (Cloud) LAPS

01 May 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about how Microsoft FTE's are going from Workplace Join to only Azure AD Join devices and their tho...

Meta E2E, Proton Pass, LI Verified ID, iPhone Security

24 Apr 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about Meta's plans on end to end encryption for Facebook and Instagram messages. They also talk abo...

Security Copilot, Incident Response Retainer, Exchange Server On-Prem

17 Apr 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about some Microsoft news including the newly unveiled Security Co-Pilot. They also talk about Microsof...

State of Identity 2023

10 Apr 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about Oort's report on the state of identity in 2023. They talk about the takeaways from the report...

News Update - MDVM, SEC Guidance, M365 Copilot

03 Apr 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about some recent news including Microsoft Defender Vulnerability Management going generally available,...

Protect your home network by the NSA

27 Mar 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about the NSA's guidance on how to secure your home network. This may be basic for most cybersecuri...

White House National Cybersecurity Strategy

20 Mar 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about the new White House National Cybersecurity Strategy from the Biden-Harris administration. -------...

Intune Suite

13 Mar 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about the new Intune Suite. This is a new offering from Microsoft that will help bolster the security and s...

Lastpass Incident Update

06 Mar 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about the update to the Lastpass security incident. There are a lot of lessons to learn from the mistakes o...

Road to the Cloud

27 Feb 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about the different states of transformation when going through your journey to reduce dependency on on-pre...

Identity Trends

20 Feb 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk through Alex Weinert's post about Identity Trends. Stay through the end to get your identity to-do list for...

Identity Governance and Administration

13 Feb 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about Identity Governance and Administration (IGA). They talk about what makes up a good IGA program and ad...

ChatGPT

06 Feb 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about ChatGPT. This innovative AI based chatbot is stirring up a storm of news. They'll talk about what it ...

Tech Layoffs

30 Jan 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about the tech layoffs. Andy talks about his career and how he's dealt with being laid off multiple times. ...

Operational Excellence

23 Jan 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about what operational excellence means and how it can help bolster your cybersecurity at your organization...

News Catchup

16 Jan 2023

Contributed by Lukas

On this week's episode, Adam and Andy do a catch up on news from December and talk about the retirement of Windows 7 ESU and 8.1. They also talk about...

Windows Defender Firewall

09 Jan 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about Windows Defender Firewall. This often is overlooked, misconfigured, or part of legacy policies. With ...

What we learned in 2022 in cybersecurity

02 Jan 2023

Contributed by Lukas

On this week's episode, Adam and Andy talk about some trends from this past year and what they would focus on securing for 2023. ---------------------...

Windows Autopatch with Special Guest Adam Nichols

26 Dec 2022

Contributed by Lukas

On this week's episode, Adam and Andy talk with Adam Nichols, a Product Manager for Windows Autopatch. They talk about all things patching and do a de...

Passkeys

19 Dec 2022

Contributed by Lukas

On this week's episode, Adam and Andy talk about passkeys. This may be the replacement for passwords that we're looking for and it is starting to go m...

Microsoft's Insider Risk Report

12 Dec 2022

Contributed by Lukas

On this week's episode, Adam and Andy talk about Microsoft's Insider Risk Report for 2022. This report give insight on how to build a holistic insider...

DDoS Protection

05 Dec 2022

Contributed by Lukas

On this week's episode, Adam and Andy talk about CISA's DDoS protection guidance. This follows the episode on Microsoft's Digital Defense Report where...

Microsoft's Digital Defense Report

28 Nov 2022

Contributed by Lukas

On this week's episode, Adam and Andy talk about Microsoft's Digital Defense Report. This report has a wealth of information on the state of cybersecu...

How to Mastodon

21 Nov 2022

Contributed by Lukas

On this week's episode, Adam is back and joined by Andy to talk about Mastodon. This decentralized social media platform has been around since 2016 an...

Patch Tuesday, Medibank Breach, Twitter Meltdown

14 Nov 2022

Contributed by Lukas

This week, friend of the pod, Shannon Fritz, fills in for Adam and he and Andy talk about the big update for Patch Tuesday, the Medibank double extort...

Old Phishing Tricks Are Still Working

07 Nov 2022

Contributed by Lukas

This week, Adam and Andy talk about the Dropbox and Twilio breach where old phishing tricks worked and attackers were able to get credentials. They al...

SOCRadar and Ignite 2022 highlights

31 Oct 2022

Contributed by Lukas

This week, Adam and Andy talk about the SOCRadar disclosure of a misconfigured Microsoft endpoint that led to a data privacy incident. They talk about...

IBM Incident Responder Report

24 Oct 2022

Contributed by Lukas

This week, Adam and Andy talk about IBM's Incident Responder Report. This report has some great empirical data on incident responder perceptions and h...

BYOD Zero-Trust Architecture

17 Oct 2022

Contributed by Lukas

This week, Adam and Andy talk about how to look at BYOD policies in a Zero-Trust architecture. They go over a blueprint put out by Microsoft Middle Ea...

MDE Tamper Protection

10 Oct 2022

Contributed by Lukas

This week, Adam and Andy talk about Microsoft Defender for Endpoint's Tamper Protection. This type of feature is also available on other endpoint prot...

Active Directory Security Tips

03 Oct 2022

Contributed by Lukas

This week, Adam and Andy talk about some tips on securing Active Directory. This was inspired by a session led by Trimarc Security at The Experts Conf...

Kerberoasted

26 Sep 2022

Contributed by Lukas

This week, Adam and Andy talk about kerberoasting: how it works and how to defend against it. Listen in on this unique attack technique! -------------...

Microsoft Teams, Patreon, and Uber

19 Sep 2022

Contributed by Lukas

This week, Adam and Andy talk about Microsoft Teams and the post-exploit technique that was discovered by Vetra's Project Team and the decision of Pat...

Cloudflare and Kiwi Farms

12 Sep 2022

Contributed by Lukas

This week, Adam and Andy breakdown what led to Cloudflare dropping Kiwi Farms as a customer, why the media and Twitter were up-in-arms about the whole...

Cloud Security 101

05 Sep 2022

Contributed by Lukas

This week, Adam and Andy talk about cloud security. If you're looking to learn about cloud security concepts, this is the show for you. They talk abou...

Beyond E5, Rebranding, Public Previews in Microsoft Security

29 Aug 2022

Contributed by Lukas

This week, Adam and Andy pull together all the new product launches and rebranding for Microsoft Security over the last couple of months. Listen in to...

Quantum & Cryptography Follow-up, TikTok, and Janet Jackson

22 Aug 2022

Contributed by Lukas

This week, Adam and Andy follow up on a few things from the post quantum cryptography episode talking about how one of the quantum resistant algorithm...

Post Quantum Series - Part 2 - Quantum Cryptography

15 Aug 2022

Contributed by Lukas

This week, Adam and Andy talk about post quantum cryptography this week. They go over why quantum computers are a threat to classical cryptography lik...

Post Quantum Series - Part 1 - Quantum Computers

08 Aug 2022

Contributed by Lukas

This week, Adam and Andy start a two part series on post-quantum computer information security. This first part goes into understanding how quantum co...

Exchange Online Protection Deep-Dive

01 Aug 2022

Contributed by Lukas

This week, Adam and Andy do a technical deep dive on Exchange Online Protection (EOP). They talk about the pre-delivery and post-delivery protections....

«« ← Prev Page 2 of 3 Next → »»