Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Azure Networking Podcasts

show episodes
 
Artwork

1
Ctrl+Alt+Azure

Tobias Zimmergren, Jussi Roine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Ctrl+Alt+Azure offers weekly conversations on Microsoft Azure, cloud strategy, security, identity, and generative AI - focused on what matters for architects, developers, CIOs, and CISOs. Hosted by industry experts Tobias Zimmergren and Jussi Roine.
  continue reading
 
Artwork

1
Cables2Clouds

Cables2Clouds

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
  continue reading
 
Artwork

1
Day Two DevOps

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join hosts Ned Bellavance and Kyler Middleton as they dive deep into the challenges of DevOps from the perspective of seasoned practitioners. You'll hear from expert guests—technical leaders, trainers, and consultants with years of hands-on experience—discussing the nuances of DevOps. From AWS to Azure, networking to security, automation to modern cloud environments, each weekly episode equips you with the insights to confidently address tech and business challenges such as resilience, cost ...
  continue reading
 
Artwork

1
Beyond the Blue Badge

Microsoft Alumni Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Beyond the Blue Badge - by the Microsoft Alumni Network Microsoft Stories that Inform and Inspire This podcast features alumni who are leaders in business, careers and philanthropy as they talk about lessons learned, overcoming obstacles, finding their bliss and thriving post-Microsoft.
  continue reading
 
Artwork

1
The Upload w/ ControlUp

Eugenia Schipelliti | Jeff Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Take control of your digital workspace environment end-to-end AND make your end-users happy with their experience. Join Eugenia Schipelliti and Jeff Johnson as they interview industry leaders, customers, and tech gurus on how ControlUp is the simplest, most cost-effective way to observe, analyze and optimize your employees’ digital experience. They’ll help you understand the technology, trends in the industry, and best practices with digital workspaces so you can understand how to keep your ...
  continue reading
 
Artwork
 
Welcome to IGEL Weekly, the podcast that explores the future of endpoint management and cloud workspaces. Hosted by XenTegra, this show dives deep into IGEL’s next-generation edge OS solutions. Discover how IGEL delivers extreme hardware cost savings, reduced operating expenses, and a more secure, streamlined platform for endpoint management across nearly any x86 device. Each week, we’ll unpack the latest industry trends, IGEL updates, and actionable insights to help you optimize your IT env ...
  continue reading
 
Welcome to 'The Citrix Session,' where we bring you the latest in Citrix technologies and solutions. Hosted by XenTegra, this podcast dives deep into the world of Citrix digital workspace solutions, exploring everything from virtual apps and desktops to networking and security. Join us each episode as we discuss best practices, new features, and expert strategies to optimize your Citrix environment and enhance your user experience. Whether you're an IT professional seeking to expand your Cit ...
  continue reading
 
Artwork

1
XenTegra - AVD Monthly + Nerdio

XenTegra / Andy Whiteside / Pete Downing

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
XenTegra podcasts are about Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
  continue reading
 
Artwork

1
Data Center Therapy

IVOXY Consulting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
  continue reading
 
The Nutanix Community Podcast is a weekly podcast. It is an informal and technical look at topics around Nutanix, Cloud and the online IT community. It will serve as a campfire and coffee shop for the extended Nutanix community.
  continue reading
 
Artwork

1
SAP on Public Cloud

Sap on Public Cloud

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Knowledge is only good when it is shared. This platform would be a destination on Tech Talks with Cloud Enthusiasts where the sole focus will be on Public Cloud #SAPonAzure #SAPonGCP #SAPonAWS We bring to you all the Industry Best Practices, Strategic Advice, Success Stories, and everything more that would make your journey on Public Cloud SIMPLE yet ENJOYABLE.
  continue reading
 
Loading …
show series
 
Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Government%3F%20%5BGuest%20Diary%5D/32536 React Update Working exploits for the React vulnerability patched yesterday are n…
  continue reading
 
Control for Compliance Supports Mac OS Jeff announces that Control for Compliance now supports Mac OS for vulnerability scanning and patching. The integration allows for real-time detection and remediation of security issues on Mac devices, similar to the existing capabilities for Windows machines. Jeff emphasizes the importance of feature parity b…
  continue reading
 
Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React server components. Exploitation is likely imminent. https://react.dev/blog/2025/12/03/critical-se…
  continue reading
 
Ned and Kyler sit down with Deana Solis, a freelance FinOps engineer and mentor. They discuss the undervalued skills of communication, look at the inherent biases and misplaced confidence of AI models, and offer guidance for those starting their careers. Deana also talks about her journey to discover the intersection of technology, career, and find…
  continue reading
 
In this episode, we unpack what's new with Microsoft Defender for Cloud. During Ignite 2025, Microsoft announced that the public preview of MDC would be available shortly, and it has arrived now. We'll take a look at what changed, what didn't, and why you should care. (00:00) - Intro and catching up. (03:52) - Show content starts. Show links - Defe…
  continue reading
 
Send us a text We break down Cloudflare’s outage, why a small config change caused big waves, and what better guardrails could look like. We then unpack AWS and Google’s cross‑cloud link, Megaport’s move into bare metal and GPUs, Webex adding deepfake defenses, and a new startup aiming to tune AI networks at microsecond speed. • Cloudflare outage r…
  continue reading
 
SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-3670629826 https://github.com/yuliskov/SmartTube/releases/tag/notification Two Years, 17K Downloads: The NPM Malware That Tried to Gas…
  continue reading
 
What does it take to be ready to deploy M365 Copilot in your organization? Richard talks to Nikki Chapple about her latest incarnation of the M365 Copilot Readiness Checklist, working step-by-step to bring M365 Copilot into the organization without causing data leak issues. Nikki discusses utilizing existing tools to accurately identify sensitive d…
  continue reading
 
How Microsoft reimagined products, sales motions, and ecosystems to embrace the cloud Take a front-row seat for one of the boldest transformations in Microsoft's history—the journey to the cloud. In this episode of Beyond the Blue Badge, hosts Becky Monk and Larry Herb (aka Major Nelson) sit down with alumni legends Steve Guggenheimer, Bob Muglia, …
  continue reading
 
Hunting for SharePoint In-Memory ToolShell Payloads A walk-through showing how to analyze ToolShell payloads, starting with acquiring packets all the way to decoding embedded PowerShell commands. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Hunting%20for%20SharePoint%20In-Memory%20ToolShell%20Payloads/32524 Android Security Bulletin December 20…
  continue reading
 
Fake adult websites pop realistic Windows Update screen to deliver stealers via ClickFix The latest variant of ClickFix tricks users into copy/pasting commands by displaying a fake blue screen of death. https://www.acronis.com/en/tru/posts/fake-adult-websites-pop-realistic-windows-update-screen-to-deliver-stealers-via-clickfix/ B2B Guest Access Cre…
  continue reading
 
In this episode, we take a look at the new Microsoft Zero Trust Assessment tool. We reflect on Zero Trust in general, its application in the Microsoft security landscape, and what this exciting tool will offer you. (00:00) - Intro and catching up. (05:00) - Show content starts. Show links - Microsoft Zero Trust Assessment tool - Demo of Microsoft Z…
  continue reading
 
Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications Spyware attacks messaging applications in part by triggering vulnerabilities in messaging applications but also by deploying tools like keystroke loggers and screenshot applications. https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-targ…
  continue reading
 
The seasonal gift show is back - Joey Snow and Rick Claus bring their lists of great gifts for sysadmins. You know they're impossible to buy for, so we are making it easier for you with a range of prices and seriousness for your favorite sysadmin. Useful gadgets, upgrades to older devices, and some fun stuff that reminds the sysadmins in your life …
  continue reading
 
Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control./32518 Sha1-Hulud, The Se…
  continue reading
 
Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%3F/32510 Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day Early exploit attem…
  continue reading
 
Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, indicating that exploitation may have occurred prior to the patch being released. https://isc.sans.edu/diary/Oracle%20Identity%20Manager%20Exploit%20…
  continue reading
 
Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names./32472 FortiWeb Multiple OS command injection in API and CLI A second silently patched vulnerability in FortiW…
  continue reading
 
Ever wonder what it takes to level up your career in data science? Senior Data Scientist Darya Petrashka joins Ned and Kyler to share her personal journey from management and linguistics into data science, the real difference between a junior and a senior role, and helps us get under the “data science umbrella” to see... Read more »…
  continue reading
 
Microsoft Ignite 2025 is here! We reflect on the hero announcements and what they mean for the future. Some exciting announcements were made during the first keynote, and we already had a chance to try a few of them out. (00:00) - Intro and catching up. (03:35) - Show content starts. Show links - ESPC’25 in Dublin - Microsoft Agent 365 - Security C…
  continue reading
 
Send us a text Networks can sometimes feel like a maze of licenses, tunnels, and 2 a.m. pager alerts. We sit down with Graphiant CEO Ali Shaikh to unpack how Network as a Service makes connectivity on-demand, consumption-based, and finally as flexible as the cloud it serves. From the SD-WAN wave to the pandemic reset, Ali explains why the old build…
  continue reading
 
KongTuke Activity This diary investigates how a recent Kong Tuke infections evolved all the way from starting with a ClickFix attack. https://isc.sans.edu/diary/KongTuke%20activity/32498 Cloudflare Outage Cloudflare suffered a large outage today after an oversized configuration file was loaded into its bot protection service https://x.com/dok2001 G…
  continue reading
 
How can Azure Site Reliability Engineering Agents help your Azure infrastructure? While at Techorama in Utrecht, Richard chatted with Deepthi Chelupati about the LLM service that helps you build and maintain more reliable applications and infrastructure in Azure. Deepthi talks about monitoring deployment problems, handling errors in production, and…
  continue reading
 
Decoding Binary Numeric Expressions Didier updated his number to hex script to support simple arithmetic operations in the text. https://isc.sans.edu/diary/Decoding%20Binary%20Numeric%20Expressions/32490 Tea Token NPM Pollution The NPM repository was hit with around 150,000 submissions that did not contain any useful contributions, but instead atte…
  continue reading
 
Fortiweb Vulnerability Fortinet, with significant delay, acknowledged a recently patched vulnerability after exploit attempts were seen publicly. https://isc.sans.edu/diary/Honeypot+FortiWeb+CVE202564446+Exploits/32486 https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/ https://fo…
  continue reading
 
SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diar…
  continue reading
 
OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-disc…
  continue reading
 
Microsoft Patch Tuesday for November 2025 https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+for+November+2025/32468/ Gladinet Triofox Vulnerability Triofox uses the host header in lieu of proper access control, allowing an attacker to access the page managing administrators by simply setting the host header to localhost. https://cloud.google.com/b…
  continue reading
 
How resilient are your Azure deployments? Richard chats with Chris Ayers about his work on Azure reliability - not only for customers using Azure, but for Azure itself! Chris focuses on the Well-Architected Framework as a guideline for thinking through all the elements of resiliency in Azure. As with all things, there are trade-offs of cost and rel…
  continue reading
 
It isn t always defaults: Scans for 3CX Usernames Our honeypots detected scans for usernames that may be related to 3CX business phone systems https://isc.sans.edu/diary/It%20isn%27t%20always%20defaults%3A%20Scans%20for%203CX%20usernames/32464 Watchguard Default Password Controversy A CVE number was assigned to a default password commonly used in W…
  continue reading
 
Honeypot Requests for Code Repository Attackers continue to scan websites for source code repositories. Keep your repositories outside your document root and proactively scan your own sites. https://isc.sans.edu/diary/Honeypot%3A%20Requests%20for%20%28Code%29%20Repositories/32460 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads Ne…
  continue reading
 
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/diary/Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%5BGuest%20…
  continue reading
 
How Microsoft's campus informed innovation and culture The story of Microsoft's iconic Redmond campus details how a bold vision turned into a tech landmark. In this episode of Beyond the Blue Badge, hosts Becky Monk and Larry Hryb along with guests Jon Shirley, Buck Ferguson and Lisa Brummel take you on the journey that for Microsoft became about m…
  continue reading
 
Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
  continue reading
 
If you think managing Kubernetes clusters is hard, what about managing Kubernetes clusters across three different public clouds? We dive into the challenges that arises from running multi-cloud Kubernetes workloads. These challenges include workload identity, DNS query resolutions, and security. Here to help us navigate this complexity and offer po…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play