RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Active Directory Podcasts
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
…
continue reading
1
Theatre · The Creative Process: Acting, Directing, Writing & Behind the Scenes Conversations
Acting, Directing, Writing & Behind the Scenes Conversations · Creative Process Original Series
Theatre episodes of the popular The Creative Process podcast. We speak to performers and behind the scenes creatives. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find us on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds of creative people. Conversations with writers, artists & creative thinkers across the Arts & STEM. We discuss their lif ...
…
continue reading
Do you support Macs in an enterprise computing environment? Our goal is to bring the experience of a conference session to you by featuring knowledgeable and experience Mac system administrators as guests. We cover everything from client management and software deployment to AD integration, server management and more!
…
continue reading
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
1
Poetry: The Creative Process: Poets discuss Poems & Creativity
Writing: Creative Process Original Series
Poetry episodes of the popular The Creative Process podcast. Listen to poets reading their poetry & discuss their lives, work & creative process. Includes environmental poetry, humanities & activism. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find our main podcast on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds of creative people. Conv ...
…
continue reading
Inside IT Automation is a podcast gathering IT professionals who are passionate about automation. Every episode consists of a friendly conversation with a guest who is generally an IT Automation professional. Check our episodes to learn more.
…
continue reading
1
LGBTQ+ Stories: The Creative Process: Gender, Equality, Gay, Lesbian, Queer, Bisexual, Homosexual, Trans Creatives Talk LGBTQ Rights
Gender, Equality, Gay, Lesbian, Queer, Bisexual, Trans Creatives: Creative Process Original Series
LGBTQ+ episodes of the popular The Creative Process podcast. Listen to Gay, Lesbian, Queer, Bisexual, Trans creatives tell their stories, discuss their lives, work & creative process. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find our main podcast on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds of creative people. Conversations with w ...
…
continue reading
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
…
continue reading
Welcome to "Business Tech Playbook" - your go-to podcast for simplifying complex technology and security concepts. As busy executives, we know you need quick, clear, and digestible information. That's why we break down tech and cyber security into straightforward terms, empowering you to lead with confidence in the digital era. Subscribe for your regular dose of insights and stay ahead of the tech curve.
…
continue reading
With thousands of organizations using Microsoft software solutions, One Identity and Microsoft have come together to make Zero Trust Active Directory Security within reach. Cybersecurity starts with identity management. For CISOs and other IT security leaders, this is at the forefront of their minds as they seek solutions to prevent breaches and enable Zero Trust. This podcast series focuses on how Microsoft and One Identity solutions work together to create a Zero Trust security model. Hear ...
…
continue reading
1
Why Technical CISOs Matter and How AI Is Shaping Security Ops - David Cross on Leading Security
21:09
21:09
Play later
Play later
Lists
Like
Liked
21:09In this episode of the Security Repo Podcast, David Cross, CISO at Atlassian and former Microsoft, Google, and Oracle security leader, shares his journey from Navy electronic warfare to global cybersecurity leadership. He offers hard-won insights on breaking into the industry, the evolving demands of the CISO role, and the practical impacts of AI o…
…
continue reading
1
Christmas Gifts for SysAdmins with Joey Snow and Rick Claus
36:57
36:57
Play later
Play later
Lists
Like
Liked
36:57The seasonal gift show is back - Joey Snow and Rick Claus bring their lists of great gifts for sysadmins. You know they're impossible to buy for, so we are making it easier for you with a range of prices and seriousness for your favorite sysadmin. Useful gadgets, upgrades to older devices, and some fun stuff that reminds the sysadmins in your life …
…
continue reading
1
Microsoft Ignite 2025: Copilot Updates, Agent 365 & SharePoint Turns 25 - Practical 365 Podcast S04E46
56:52
56:52
Play later
Play later
Lists
Like
Liked
56:52Ignite 2025 delivered major updates across Microsoft 365. In this episode, we discuss: Agent 365: Public preview now. Manage AI agents like identities with Entra Agent ID, renamed app registrations, and Teams app visibility. Copilot updates: Work IQ adds proactive personalization. Voice in Outlook Mobile for hands-free triage and scheduling (early …
…
continue reading
1
Run local AI on any PC or Mac - Microsoft Foundry Local
11:01
11:01
Play later
Play later
Lists
Like
Liked
11:01Build powerful AI apps that run locally on any device—Windows, macOS, or mobile—without relying on the cloud using Foundry Local. Leverage full hardware performance, keep data private, reduce latency, and predict costs, even in offline or low-connectivity scenarios. Simplify development and deploy AI apps across diverse hardware and OS platforms wi…
…
continue reading
1
Microsoft Sentinel platform – Unified, Graph-enabled, and AI-ready Security
9:21
9:21
Play later
Play later
Lists
Like
Liked
9:21Unify your security data and use AI to reason over your entire digital estate with Microsoft Sentinel. See how threats evolve in real time, map attack paths, and understand which assets are most at risk. Visualize relationships across users, devices, and resources to pinpoint vulnerabilities and focus your response where it matters most. Using natu…
…
continue reading
1
Replace your VPN - Global Secure Access in Microsoft Entra
10:12
10:12
Play later
Play later
Lists
Like
Liked
10:12Connect users to on-premises resources while enforcing Conditional Access policies, including MFA, and eliminate the need for VPNs using Secure Access Service Edge with Microsoft Entra. Route authentication through Microsoft Entra before granting resource access, even within legacy on-premises systems. Boost performance with intelligent local acces…
…
continue reading
1
Identity Risks in Email: Your Inbox Might Be Lying About You – Amy Devine
24:18
24:18
Play later
Play later
Lists
Like
Liked
24:18In this episode of the Security Repo Podcast, Dwayne McDaniel sits down with Amy Devine, a systems architect who transitioned from embedded wireless systems to cybersecurity. Amy shares the eye-opening story behind her Blue Team Con talk on how misdirected emails exposed sensitive personal data and what that means for digital identity. The conversa…
…
continue reading
1
Synced Passkeys in Microsoft Entra for Phishing-resistant MFA
8:14
8:14
Play later
Play later
Lists
Like
Liked
8:14Secure sign-in across all your devices without relying on passwords or extra apps using passkeys in Microsoft Entra. Register, sync, and use passkeys with just your device's camera and biometrics, making authentication seamless, fast, and phishing-resistant. As an admin, control who uses which passkey type, streamline recovery with Verified ID, and…
…
continue reading
Attackers and threat actors use command and control techniques, also known as C2, to gain access to networks and communicate with compromised devices. On this episode of Security Noise, Geoff and Skyler are joined by Principal Research Analyst Scott Nusbaum to discuss C2 techniques. Listen as they cover how different types of attackers typically us…
…
continue reading
1
New Data Security Posture Management | Microsoft Purview
10:01
10:01
Play later
Play later
Lists
Like
Liked
10:01Locate, assess, and prioritize high-risk data across Microsoft and non-Microsoft services using Microsoft Purview Data Security Posture Management (DSPM). Identify sensitive files, understand emerging data risks, and focus remediation efforts where they matter most without slowing down productivity. You can also remediate oversharing, enforce data …
…
continue reading
How can Azure Site Reliability Engineering Agents help your Azure infrastructure? While at Techorama in Utrecht, Richard chatted with Deepthi Chelupati about the LLM service that helps you build and maintain more reliable applications and infrastructure in Azure. Deepthi talks about monitoring deployment problems, handling errors in production, and…
…
continue reading
1
Windows 365 updates | AI‑Ready Work, Apps on Demand, Resilient Access
13:40
13:40
Play later
Play later
Lists
Like
Liked
13:40Automate real work, modernize app delivery, and keep users productive from any device with Windows 365 for Agents. Assign AI agents their own Cloud PCs to complete tasks in your apps and workflows using natural-language instructions to eliminate fragile UI-based automation and accelerate scalable, resilient processes across your organization. Publi…
…
continue reading
1
Beyond Firewalls: The People Behind Cyber Resilience with Nathan Wenzler, Field CISO at Optiv
50:34
50:34
Play later
Play later
Lists
Like
Liked
50:34This episode features Nathan Wenzler, Field Chief Information Security Officer at Optiv. With nearly 30 years of experience leading cybersecurity programs across government agencies, nonprofits, and Fortune 1000 companies, Nathan has spent his career at the intersection of people, process, and technology. He’s helped organizations redefine what it …
…
continue reading
1
From Military Intel to CISO: Navigating Security Leadership in the Age of AI – Darren Desmond
22:54
22:54
Play later
Play later
Lists
Like
Liked
22:54In this episode of the Security Repo Podcast, we sit down with Darren Desmond, a seasoned CISO with a background in UK military intelligence, to unpack his unconventional journey from fish and chips to threat intelligence. He shares how his military forensics experience shaped his InfoSec leadership and dives deep into the evolving role of the CISO…
…
continue reading
How resilient are your Azure deployments? Richard chats with Chris Ayers about his work on Azure reliability - not only for customers using Azure, but for Azure itself! Chris focuses on the Well-Architected Framework as a guideline for thinking through all the elements of resiliency in Azure. As with all things, there are trade-offs of cost and rel…
…
continue reading
1
The Beast in Me starring CLAIRE DANES - Behind the Scenes w/ HOWARD GORDON & DANIEL PEARLE
46:26
46:26
Play later
Play later
Lists
Like
Liked
46:26“And I think there's also just something about an unfettered or uncensored id that is so captivating. We all have that fantasy of doing exactly what we want with no consequences and sort of letting that go. I think when you see an athlete at the peak of their game, doing that embodied thing and living that dream, or when someone has actually done h…
…
continue reading
1
Mapping the InfoSec Community: Building InfoSecMap & Global Security Events – Martín Villalba
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04In this episode of the Security Repo Podcast, we sit down with Martín Villalba, founder of InfoSecMap, to explore how his platform is transforming the way InfoSec professionals discover global events, communities, and CFPs. We dive into the origin story of InfoSecMap, its recent growth surge, and its strategic partnerships with organizations like O…
…
continue reading
1
Managing Updates using Autopatch with Aria Hanson
31:54
31:54
Play later
Play later
Lists
Like
Liked
31:54The future of updating Windows is here! Richard talks to Aria Hanson about Windows Autopatch, the consolidation of Microsoft's various update mechanisms to keep your managed Windows devices current. Aria discusses the deprecation of Windows Server Update Services (WSUS) and the move to always-on cloud updates. The conversation turns to the various …
…
continue reading
1
The DNA of Organizational Resilience: Leadership First, Technology Last with Heather Costa, Director of Technology Resilience at Mayo Clinic
41:21
41:21
Play later
Play later
Lists
Like
Liked
41:21This episode features Heather Costa, Director of Technology Resilience at Mayo Clinic. With over two decades of experience building resilience programs at leading healthcare institutions, Heather has redefined what it means to prepare for and thrive through disruption. From Cleveland Clinic to Mayo Clinic, she’s led enterprise-wide recovery strateg…
…
continue reading
1
8.5 - Footprint Discovery for Red Teamers
29:18
29:18
Play later
Play later
Lists
Like
Liked
29:18Red Teaming 101: understand your target before you attack. On this episode, we invited two heavy hitters, Principal Security Consultants Hans Lakhan and Oddvar Moe on the show to talk about Red Team operations. We discuss footprinting and reconnaissance techniques including identifying a target's online presence, the tools and methods used for reco…
…
continue reading
1
Farewell Last Exchange Server, Copilot Memory Rolls Out, and Agentic AI Improvements – Practical 365 Podcast S04E45
45:34
45:34
Play later
Play later
Lists
Like
Liked
45:34In this episode of the Practical 365 Podcast, Steve Goodman and Paul Robichaux discuss major Exchange updates – including the fallout from a recent AWS outage, Microsoft’s new tools to finally remove your last on-premises Exchange server, the final patches for Exchange 2016/2019, and a new auto-archiving feature for Exchange Online. They also dive …
…
continue reading
1
Microsoft Excel Power User Updates | Agent Mode, Copilot Function & Formula AI
9:06
9:06
Play later
Play later
Lists
Like
Liked
9:06Turn raw Excel data into actionable insights, visual dashboards, and KPIs in minutes. With Agent Mode, automate complex analysis, create pivot tables, and build interactive dashboards without manual setup. Streamline text analysis, formula generation, and complex calculations right inside Excel. Use the Copilot function to categorize feedback, scor…
…
continue reading
1
Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx
29:34
29:34
Play later
Play later
Lists
Like
Liked
29:34Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx In this episode of the Security Repo Podcast, François Proulx, VP of Security Research at Boost Security, discusses the evolving threats in software supply chain security, particularly focusing on attacks targeting CI/CD pipelines. He explains how open source tools li…
…
continue reading
How can the new AI tools help DBAs? Richard chats with Grant Fritchey about his experiences using various types of LLMs to help with his work as a DBA. Grant discusses having an LLM open as a side window to pass questions by, such as ideas for tuning, query optimization, scripts, and so on. Not all LLMs are the same - it's worth experimenting with …
…
continue reading
1
8.4 - CON Men: Wild West Hackin' Fest + GrrCON
26:23
26:23
Play later
Play later
Lists
Like
Liked
26:23On this special Friday Edition of Security Noise, Geoff lets Skyler out of the sound booth and sends him to Deadwood, South Dakota to attend (and speak at) Wild West Hackin' Fest! Skyler also interviews TrustedSec's Senior Security Consultant David Boyd on his WWHF talk on Social Engineering and Principal Security Consultant Adam Compton's GrrCON t…
…
continue reading
1
Fighting Tool Squatting And Prompt Injection & The Security Gaps In MCP – Srajan Gupta
23:41
23:41
Play later
Play later
Lists
Like
Liked
23:41In this episode of the Security Repo Podcast, we welcome Srajan Gupta, a security engineer exploring the evolving security implications of Model Context Protocol (MCP) servers. Shrojan breaks down how MCPs act as AI connectors to external systems and the alarming rise in attack surfaces, including tool squatting and indirect prompt injections. The …
…
continue reading
1
"Everything is Art. Everything is Politics." AI WEIWEI'S TURANDOT Dir. MAXIM DEREVIANKO - Highlights
“So when we decided to do a documentary to follow Ai Weiwei, we knew, of course, it wouldn't be just a simple opera, and we knew he would bring his own very special and original vision. Because, of course, he is not an opera director. From his point of view, it's a challenge, but from another perspective, it’s probably an enrichment for the opera a…
…
continue reading