Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Blue Security

Technology

Episodes

Showing 201-277 of 277
«« ← Prev Page 3 of 3

Password Cracking

28 Feb 2022

Contributed by Lukas

This week's episode, Adam and Andy talk about the basics of password cracking. Understanding how passwords are cracked by offensive security and cyber...

Geopolitical Crises and Cybersecurity

21 Feb 2022

Contributed by Lukas

This week's episode, Adam and Andy talk about some of the geopolitical crises happening around the world with Russia and China and how that affects cy...

Windows Defender Application Control

14 Feb 2022

Contributed by Lukas

This week's episode, Adam and Andy continue their Windows Security series and talk about Defender Application Control. This is a great feature built i...

Tabletop Scenarios with Special Guests Nate Gardner and Gavin Ashton

07 Feb 2022

Contributed by Lukas

This week's episode, Adam and Andy have a great time chatting with fellow cybersecurity professionals Nate Gardner and Gavin Ashton walking through ta...

News Smash

31 Jan 2022

Contributed by Lukas

This week's episode, Adam and Andy talk catch up on some infosec news including BadUSB, President Biden's memorandum for National Security Systems, iO...

Windows Device Management with Special Guest Shannon Fritz

24 Jan 2022

Contributed by Lukas

This week's episode, Adam and Andy talk with special guest Shannon Fritz on Windows Device Management. If you haven't listened to Shannon's episode on...

F12 and Find Out

17 Jan 2022

Contributed by Lukas

This week's episode, Adam and Andy talk about the importance of the nomenclature we use in information security. They also talk about the perception o...

Digital Asset Management

10 Jan 2022

Contributed by Lukas

This week's episode, Adam and Andy talk about a fundamental important program for security defenders: asset management. It may not be the most excitin...

A look back on 2021

03 Jan 2022

Contributed by Lukas

This week's episode, Adam and Andy give an update on Log4j/Log4Shell insights from the Google Security Team. They also look back on some of the vulner...

Work Life Balance

27 Dec 2021

Contributed by Lukas

This week's episode, Adam and Andy talk all about a healthy work life balance. With the pandemic still on-going and working from home or hybrid work e...

Threat and Vulnerability Management

20 Dec 2021

Contributed by Lukas

This week, Adam and Andy talk all about how to start and run a threat  and vulnerability program at your company. From asset management,  sc...

Log4Shell

13 Dec 2021

Contributed by Lukas

This week, Adam and Andy talk all about the Log4Shell vulnerability affecting the log4j Java library. They give an overview on how it works and how yo...

Security Champions

06 Dec 2021

Contributed by Lukas

This week, Adam and Andy talk about a security champions program. This is a way to bolster the security culture and develop representatives in each bu...

Things are getting better

29 Nov 2021

Contributed by Lukas

This week, Adam and Andy talk about how they see things improving in the cybersecurity industry from the Department of Justice and the US government i...

Zero Trust, Amazon Security, and other news

22 Nov 2021

Contributed by Lukas

This week, Adam and Andy talk about some recent infosec news, a shocking article about Amazon's lack of security, and what zero trust means to them. -...

Ignite 2021 Fall Highlights

15 Nov 2021

Contributed by Lukas

This week, Adam and Andy go over some of the endpoint, Windows, and security announcements from Ignite. If you were too busy to watch any of the sessi...

Cybersecurity Talent Gap

08 Nov 2021

Contributed by Lukas

This week, Adam and Andy talk about the cybersecurity talent gap. They give advice to those who are trying to break into the field as well as hiring m...

Microsoft Digital Defense Report, Consumer Expectations, and Gartner

01 Nov 2021

Contributed by Lukas

This week, Adam and Andy talk about Microsoft's Digital Defense Report,  consumer expectations of "invisible" security, and should you rip out an...

Windows 365 with Special Guest Bradley Dupay

25 Oct 2021

Contributed by Lukas

This week, Adam and Andy talk with Microsoft's Global Black Belt Specialist, Bradley Dupay, about the all new cloud PC offering called Windows 365. Th...

Facebook Outage Learnings and Windows 11 security

18 Oct 2021

Contributed by Lukas

This week on the Blue Security Podcast, Adam and Andy talk about the Facebook outage and what security defenders can learn from reading their after ac...

You are going to be a victim of ransomware

11 Oct 2021

Contributed by Lukas

This week on the Blue Security Podcast, Adam and Andy talk about planning to be a victim of ransomware. This is a mindset shift. Instead of focusing o...

TPM design limitations and Apple-Google app store actions

04 Oct 2021

Contributed by Lukas

This week on the Blue Security Podcast, Adam and Andy talk about two interesting topics. The first is a pentesting company's successful hack Bitlocker...

Protonmail kerfuffle

27 Sep 2021

Contributed by Lukas

This week on the Blue Security Podcast, Adam and Andy talk about the hot water Protonmail got themselves into when the news reported that they  p...

Misconceptions about MDM

20 Sep 2021

Contributed by Lukas

This week on the Blue Security Podcast, Adam and Andy go over a bunch of misconceptions about mobile device management spurred by some chatter on Twit...

One year anniversary!

13 Sep 2021

Contributed by Lukas

This week on the Blue Security Podcast, Adam and Andy celebrate one year of the podcast looking back on past episodes and key takeaways. -------------...

Apple's Protections for Children

06 Sep 2021

Contributed by Lukas

This week on the Blue Security Podcast, Adam and Andy talk about Apple's new proposed iOS 15 feature to protect children. They break down the technica...

Security News Edition: Lockfile, Razer, and T-mobile

30 Aug 2021

Contributed by Lukas

This week on the Blue Security Podcast, Adam and Andy breakdown some of the latest infosec news. They go over some hardening advice on the current Exc...

Windows Hello for Business

23 Aug 2021

Contributed by Lukas

This week on the Blue Security Podcast, Adam and Andy discuss the enterprise-ready passwordless solution that's already built into your Windows 10 PCs...

Mistakes that hinder a security team's success with Special Guest Nate Gardner

16 Aug 2021

Contributed by Lukas

This week, Nate Gardner joins Andy to talk about mistakes that security teams can make that will hinder their success at organizations. And these aren...

Secure Privileged Access

09 Aug 2021

Contributed by Lukas

This week, Adam and Andy go through Microsoft's best practice on securing privileged access. This documentation is amazing and extremely detailed. The...

Windows Defender Application Guard

02 Aug 2021

Contributed by Lukas

This week, Adam and Andy continue their series on Windows security by talking about Windows Defender Application Guard. This is a great security featu...

Pegasus, Twitter MFA, & Underfunding Infosec

25 Jul 2021

Contributed by Lukas

This week, Adam and Andy discuss some interesting articles that were published during the week. Pegasus, a suite of mobile phone exploits, was big in ...

CISA's RVA findings and what it means for organizations

19 Jul 2021

Contributed by Lukas

This week, Adam and Andy go over CISA's (Cybersecurity & Infrastructure Security Agency) Risk and Vulnerability Assessments finding for 2020. In C...

The Tech We Use

12 Jul 2021

Contributed by Lukas

This week, Andy and Adam take a break from cybersecurity and have a little fun talking about the tech they use. They chat about their phones, computer...

Information Protection with Special Guest Rachel O'Shea

05 Jul 2021

Contributed by Lukas

This week, Rachel O'Shea, a Senior Technical Specialist in Compliance at Microsoft, join Adam and Andy to talk about information protection and govern...

Should you block or allow this app?

28 Jun 2021

Contributed by Lukas

This week, Adam and Andy talk about what infosec professionals should consider when being asked to block or allow an application. --------------------...

Special Episode - Programming Note

21 Jun 2021

Contributed by Lukas

Adam and Andy have some news to share!

Windows Defender Credential Guard

21 Jun 2021

Contributed by Lukas

This week, Adam and Andy do a deep technical dive on Windows Defender Credential Guard. This security feature is part of Windows 10 Enterprise and not...

The True Cost of Ransomware

14 Jun 2021

Contributed by Lukas

This week, Adam and Andy talk about how cyberattacks and ransomware incidents are increasing in  frequency and how the financial impact is gettin...

Digital Every Day Carry (EDC)

07 Jun 2021

Contributed by Lukas

This week, Adam and Andy talk about their digital "Every Day Carry" (EDC). These are tools they use personally on an every day basis to keep themselve...

That Infosec Op-Ed

31 May 2021

Contributed by Lukas

This week, Adam and Andy talk about the op-ed written by Prof Allen Gwinn in The Hill that had the information security community up in arms. They cou...

Information Security Leadership with Special Guest Doug Turecek

24 May 2021

Contributed by Lukas

This week, Adam and Andy talk with Doug Turecek. Doug has over 25 years of experience in information technology and is currently the Information Secur...

Colonial Pipeline and other news

17 May 2021

Contributed by Lukas

This week, Adam and Andy talk about the Colonial Pipeline ransomware incident, the executive order President Biden signed on improving cybersecur...

Security Change Management

10 May 2021

Contributed by Lukas

This week Andy and Adam talk about security change management. Rolling  out a security change or a new security product can be difficult and &nbs...

Browser Security

03 May 2021

Contributed by Lukas

This week Andy and Adam talk about browser security. They break down why it's important to secure your browser's configuration and recommendations on ...

Mentorship with Special Guest Matt Wood

26 Apr 2021

Contributed by Lukas

This week Andy and Adam chat with Matt Wood. Matt is an information security manager who was Andy's first mentor in infosec. They talk about the impor...

M365 Productivity Tips and Tricks

19 Apr 2021

Contributed by Lukas

This week, Adam and Andy take a break from security and give you their favorite tips and tricks for the M365 Suite. Hopefully you learn something and ...

Zscaler Security with Raja Khalid

12 Apr 2021

Contributed by Lukas

This week, Adam and Andy chat with Raja on Zscaler, one of our favorite tools when it comes to DNS security (and more!). Zscaler is a scalab...

Mac Management with Special Guest Matthew Ward and Matt Benyo

05 Apr 2021

Contributed by Lukas

This week, Adam and Andy are joined by Matthew Ward and Matt Benyo to talk about Mac Management. Macs are more and more important in enterpr...

How to get into cybersecurity and the skills you need

29 Mar 2021

Contributed by Lukas

This week, Adam and Andy cover how people can break into the cybersecurity industry and the skills they might need prior to finding their first j...

Azure Sentinel with Special Guest John Joyner

21 Mar 2021

Contributed by Lukas

This week, Microsoft MVP John Joyner joins the show to talk about Azure Sentinel. If you're in the market for a SIEM or looking to bolster your securi...

Physical Security with Special Guest Wesley Strey

15 Mar 2021

Contributed by Lukas

This week, Andy is joined by Wesley Strey to talk about the subdomain of physical security. There are so many great parallels between information secu...

Say Goodbye to Domain Join with Special Guest Shannon Fritz

08 Mar 2021

Contributed by Lukas

This week, Shannon Fritz joins the show to talk about device identity and why you should start joining your devices to Azure Active Directory. This sh...

Cloud Application Security Brokers

28 Feb 2021

Contributed by Lukas

This week, Adam and Andy talk about cloud application security brokers (CASB). The podcast is focused more around Microsoft Cloud App Security but the...

Password Managers

22 Feb 2021

Contributed by Lukas

This week, Adam and Andy talk about password managers. They discuss on password managers can protect you from phishing attacks, pros/cons of storing y...

What is EvilGinx and How do you protect against it?

15 Feb 2021

Contributed by Lukas

This week, Adam and Andy talk about a Red Team/Pentesting tool called EvilGinx. They explain how this tool works and how cyber-criminals can use it to...

Modern Device Management

08 Feb 2021

Contributed by Lukas

This week, Adam and Andy go over modern device management. They discuss how to use device based conditional access to make access decisions on corpora...

Real-world Ransomware Experience with Special Guest Gavin Ashton

01 Feb 2021

Contributed by Lukas

This week, Adam and Andy speak with Stealthbits security strategist, Gavin Aston. Gavin wrote the blog "Maersk, me & notPetya" and brings a unique...

Application Security with Special Guest Tanya Janca

25 Jan 2021

Contributed by Lukas

This week, Adam and Andy speak with application security guru, Tanya Janca, author of Alice and Bob learn Application Security. It was an amazing conv...

Secure Messaging

18 Jan 2021

Contributed by Lukas

This week, Adam and Andy go over some news about Microsoft Defender for Identity and Intel's new CPU ransomware protection. There was also some news a...

Solarwinds Revisited and Tech Policy under a Biden Administration

11 Jan 2021

Contributed by Lukas

This week, Adam and Andy revisit some more guidance that has come out about Sunburst/Solarigate since the initial breach. Additionally, they share som...

Information Security Tips & Tricks for Parents

04 Jan 2021

Contributed by Lukas

Happy New Year! To ring in the new year, this week's episode focuses on parents who are working from home while having to help home school their kids ...

Merry Christmas! Learn how to spin up your own VM lab and dev environments

27 Dec 2020

Contributed by Lukas

This holiday week, Adam and Andy give you some advice on how to spin up your own virtual machine lab and dev environment. They go through SaaS applica...

Our thoughts on Fireeye, Solarwinds, and Sunburst

21 Dec 2020

Contributed by Lukas

This week, Adam and Andy give you their thoughts on the Fireeye and Solarwinds breach. They also give defenders advice on immediate steps to help stre...

Passwordless Authentication

14 Dec 2020

Contributed by Lukas

Passwordless authentication is one of those rare features that strengthens security while making it easier for users to sign in. This week, Adam and A...

Conditional Access

07 Dec 2020

Contributed by Lukas

This is it! Adam and Andy are finally diving into conditional access. They give an overview on what conditional access is including different types of...

Work from Home - Tips and Tricks

30 Nov 2020

Contributed by Lukas

On this week's episode, Andy and Adam give you their tips and tricks for working from home. Having been in mature work from home company cultures, the...

Our thoughts on Chris Krebs, Infosec Job Security, and Infosec Qualifications

23 Nov 2020

Contributed by Lukas

On this week's episode, Andy and Adam give their thoughts on the firing of Chris Krebs, former director of CISA. They also talk about their opinions o...

Active Directory Security with Special Guest Morgan Patzwald

16 Nov 2020

Contributed by Lukas

This week, Morgan joins Adam and Andy on the podcast to discuss on-prem Active Directory security. They dive into administrator privileges, best pract...

Single-Sign On (SSO) and Self-Service Password Reset (SSPR)

09 Nov 2020

Contributed by Lukas

This week, Adam and Andy go over why you should think about using an Identity Provider (IDP) to onboard your SaaS apps to use SSO. They also talk abou...

How did we get into information security and career progression advice

02 Nov 2020

Contributed by Lukas

This week, Adam and Andy bring you a bonus episode where they talk about how they got into information security and offer advice on career progression...

Ransomware protection - Part 4 - Windows 10 Security, Network Segmentation, Detection and Recovery

26 Oct 2020

Contributed by Lukas

This week, Adam and Andy wrap up the ransomware series by first going over controlled folder access in Windows 10 security and Onedrive for Business K...

Ransomware Protection - Part 3 - Admin Rights, Email Protection, Phishing Training

19 Oct 2020

Contributed by Lukas

This week, Adam and Andy continue the conversation on techniques and tools to protect your organization from ransomware. They dive into the concept of...

Ransomware Protection - Part 2 - EDR, Patching, and Pentesting

12 Oct 2020

Contributed by Lukas

This week, Adam and Andy continue the conversation on techniques and tools to protect your organization from ransomware. They dive into EDR solutions,...

Ransomware Protection - Part 1 - Soft Skills and Endpoint Protection

05 Oct 2020

Contributed by Lukas

Due to the recent ransomware attacks, Adam and Andy use this episode to kick off a series on how to protect your company from ransomware. We started w...

Enabled MFA!

28 Sep 2020

Contributed by Lukas

In this episode, Adam and Andy talk about why if you have not enabled MFA for your identity provider (IDP), this should be your top priority today. Th...

Geo-restricting IP addresses, Password policies, Defense against password spray attacks

21 Sep 2020

Contributed by Lukas

In this first episode, Adam and Andy discuss whether geo-restricting IP addressing is considered "good" security. They also discuss Azure AD password ...

«« ← Prev Page 3 of 3