Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Active Directory Podcasts

show episodes
 
Artwork
 
Poetry episodes of the popular The Creative Process podcast. Listen to poets reading their poetry & discuss their lives, work & creative process. Includes environmental poetry, humanities & activism. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find our main podcast on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds of creative people. Conv ...
  continue reading
 
Artwork

1
Theatre · The Creative Process: Acting, Directing, Writing & Behind the Scenes Conversations

Acting, Directing, Writing & Behind the Scenes Conversations · Creative Process Original Series

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Theatre episodes of the popular The Creative Process podcast. We speak to performers and behind the scenes creatives. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find us on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds of creative people. Conversations with writers, artists & creative thinkers across the Arts & STEM. We discuss their lif ...
  continue reading
 
Artwork

4
Music & Dance: Musicians, Composers, Singers, Dancers, Choreographers, Performers Talk Art, Creativity & The Creative Process

Musicians, Composers, Performers, Dancers, Choreographers...in Conversation: Creative Process Original Series

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Music & Dance episodes of the popular The Creative Process podcast. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find our main podcast on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds of creative people. Conversations with writers, artists & creative thinkers across the Arts & STEM. We discuss their life, work & artistic practice. Winners ...
  continue reading
 
Artwork

1
MacEnterprise Podcast

The MacEnterprise Podcast Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Do you support Macs in an enterprise computing environment? Our goal is to bring the experience of a conference session to you by featuring knowledgeable and experience Mac system administrators as guests. We cover everything from client management and software deployment to AD integration, server management and more!
  continue reading
 
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
  continue reading
 
Artwork

1
Film & TV, The Creative Process: Acting, Directing, Writing, Cinematography, Producers, Composers, Costume Design, Talk Art & Creativity

Acting, Directing, Writing, Cinematography Producing Conversations: Creative Process Original Series

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Film & TV episodes of the popular The Creative Process podcast. We speak to actors, directors, writers, cinematographers & variety of behind the scenes creatives about their work and how they forged their creative careers. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find our main podcast on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds o ...
  continue reading
 
Artwork
 
The CYSA PrepCast is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
  continue reading
 
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
  continue reading
 
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Artwork

1
LGBTQ+ Stories: The Creative Process: Gender, Equality, Gay, Lesbian, Queer, Bisexual, Homosexual, Trans Creatives Talk LGBTQ Rights

Gender, Equality, Gay, Lesbian, Queer, Bisexual, Trans Creatives: Creative Process Original Series

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
LGBTQ+ episodes of the popular The Creative Process podcast. Listen to Gay, Lesbian, Queer, Bisexual, Trans creatives tell their stories, discuss their lives, work & creative process. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find our main podcast on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds of creative people. Conversations with w ...
  continue reading
 
Artwork

1
Security Noise

TrustedSec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
  continue reading
 
Artwork

1
Data Center Therapy

IVOXY Consulting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
  continue reading
 
Artwork
 
Welcome to "Business Tech Playbook" - your go-to podcast for simplifying complex technology and security concepts. As busy executives, we know you need quick, clear, and digestible information. That's why we break down tech and cyber security into straightforward terms, empowering you to lead with confidence in the digital era. Subscribe for your regular dose of insights and stay ahead of the tech curve.
  continue reading
 
Artwork
 
With thousands of organizations using Microsoft software solutions, One Identity and Microsoft have come together to make Zero Trust Active Directory Security within reach. Cybersecurity starts with identity management. For CISOs and other IT security leaders, this is at the forefront of their minds as they seek solutions to prevent breaches and enable Zero Trust. This podcast series focuses on how Microsoft and One Identity solutions work together to create a Zero Trust security model. Hear ...
  continue reading
 
Loading …
show series
 
In this episode, we're diving into one of the most overlooked yet dangerous components of Active Directory: Certificate Services. What was designed to build trust and secure authentication is now being exploited by attackers to silently escalate privileges and persist in your environment. We’ll break down how AD CS works, how it gets abused, and wh…
  continue reading
 
In this episode, we're diving into what to do the minute incident response arrives. That first moment matters—a lot. Whether it's a ransomware attack, unauthorized access, or data exfiltration, how you act in minute one can either help or hinder the investigation. We’ll cover the do’s, don’ts, and common mistakes we see, so you’re ready when the he…
  continue reading
 
Are you tapping the power of Microsoft Graph? Richard chats with Tony Redmond about his work teaching people to leverage Microsoft Graph and all the insights it can provide about their organization. Tony views Graph as one of the key skills a sysadmin needs to manage an M365 tenant, alongside Exchange Online, SharePoint, and Teams. Throw in some En…
  continue reading
 
"For the last two decades, I've made over 20 films about the environment, starting with oil and carbon emissions. Those films, Kiss the Ground and now Common Ground, talk about how we can stabilize the climate, reverse climate change, grow nutrient-dense food, and help farmers make a profit through biodiversity and regenerative practices and princi…
  continue reading
 
In this episode of The Cyber Threat Perspective, we're diving into one of the most pressing trends in cybersecurity: how threat actors are using AI. From deepfake scams and AI-generated phishing emails to automated malware and voice cloning, attackers are leveraging artificial intelligence to scale their operations and sharpen their tactics. We’ll …
  continue reading
 
What can the financial services sector teach us about adopting Copilot in our organizations? Richard chats with Christina Wheeler about her work at Microsoft, where she helps companies leverage large language model technologies. Christina discusses data security, which is crucial in the financial services industry due to its numerous regulations. T…
  continue reading
 
“I didn't really appreciate bees until I became a farmer, and then I started to understand how essential bees are for our food. They pollinate 70% of our food, and that feeds 90% of the world. There's a whole world of insects that creates the color in our food; it's what creates the flavor in our food. It's part of our biodiversity, and it's essent…
  continue reading
 
“I had to become the father of my family very young because my parents divorced when I was 12. My situation was a little bit unusual in that my father kind of disappeared, and I had been making a fair amount of money as a kid, doing commercials and television and film. We needed money, and I kind of became the breadwinner. But I had this amazing wo…
  continue reading
 
“I had to become the father of my family very young because my parents divorced when I was 12. My situation was a little bit unusual in that my father kind of disappeared, and I had been making a fair amount of money as a kid, doing commercials and television and film. We needed money, and I kind of became the breadwinner. But I had this amazing wo…
  continue reading
 
“I had to become the father of my family very young because my parents divorced when I was 12. My situation was a little bit unusual in that my father kind of disappeared, and I had been making a fair amount of money as a kid, doing commercials and television and film. We needed money, and I kind of became the breadwinner. But I had this amazing wo…
  continue reading
 
“I had to become the father of my family very young because my parents divorced when I was 12. My situation was a little bit unusual in that my father kind of disappeared, and I had been making a fair amount of money as a kid, doing commercials and television and film. We needed money, and I kind of became the breadwinner. But I had this amazing wo…
  continue reading
 
In this episode, we break down a question that often gets overlooked: When should you not do a penetration test? Not every organization needs a pentest right away, and choosing the wrong assessment can waste time, money, and effort. We’ll walk through the differences between pentests, vulnerability scans, and risk assessments — and when each one is…
  continue reading
 
“I won my first Emmy when I was 21, which was the result of absolutely devoting myself day and night for two years to doing all the scene work. I attended classes simultaneously and did plays until my mother died. I studied with Michael Howard for eight years. Even when I was so tired I couldn't get up to do a scene, he would say, "Get up and do a …
  continue reading
 
“I won my first Emmy when I was 21, which was the result of absolutely devoting myself day and night for two years to doing all the scene work. I attended classes simultaneously and did plays until my mother died. I studied with Michael Howard for eight years. Even when I was so tired I couldn't get up to do a scene, he would say, "Get up and do a …
  continue reading
 
“I won my first Emmy when I was 21, which was the result of absolutely devoting myself day and night for two years to doing all the scene work. I attended classes simultaneously and did plays until my mother died. I studied with Michael Howard for eight years. Even when I was so tired I couldn't get up to do a scene, he would say, "Get up and do a …
  continue reading
 
“I won my first Emmy when I was 21, which was the result of absolutely devoting myself day and night for two years to doing all the scene work. I attended classes simultaneously and did plays until my mother died. I studied with Michael Howard for eight years. Even when I was so tired I couldn't get up to do a scene, he would say, "Get up and do a …
  continue reading
 
Join Steve Goodman, Paul Robichaux, and Bastiaan Verdonk as they delve into the critical security vulnerabilities affecting on-premises SharePoint servers, including the "ToolShell" exploit chain (CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, CVE-2025-53771) which enables unauthenticated remote code execution. They discuss the scale of the proble…
  continue reading
 
How do you get from ClickOps to DevOps? While at Build, Richard chatted with Steven Bucher about using Copilot in Azure to help build PowerShell scripts with Azure CLI to get you moving down the path of repeatable deployment. Steven talks about interacting with Copilot in Azure through the Portal, Azure CLI, and PowerShell. Using tools like GitHub …
  continue reading
 
How do you bring AI agents to your organization? Richard chats with April Dunnam about her experiences with Copilot Studio, Microsoft's tool for building various agents for your organization. April discusses the multiple approaches available today for utilizing generative AI and the benefits of leveraging template-driven and low-code solutions to c…
  continue reading
 
Sean is joined by identity expert Sander Berkouwer to explore theevolving landscape of enterprise authentication. Active DirectoryFederation Services (AD FS), first introduced with Windows Server 2003,continues to support many organizations with single sign-on. However,its usage is steadily declining as cloud-native solutions take centerstage. Sean…
  continue reading
 
It’s easy to overlook small misconfigurations on Windows endpoints, but those little mistakes can create big opportunities for attackers. In this episode, we break down the most common Windows security missteps we see in real-world environments, from missing the basics to reused local admin passwords. If you’re a sysadmin, IT admin, or just respons…
  continue reading
 
What's happening with Fabric in 2025? While at Build, Richard chatted with Arun Ulag about the fantastic progress Fabric has made in the past year. Arun discusses expanding the product line beyond analytics to include real-time intelligence and hosting primary data workloads. The goal is to make it incredibly easy to get your organization's "data e…
  continue reading
 
Every incident response process must end with two critical questions: What went wrong? And how do we prevent it next time? In this final episode of Domain 4, we explore the structure and value of root cause analysis (RCA) and the metrics analysts use to evaluate incident response performance. You'll learn techniques for identifying the initial fail…
  continue reading
 
When a breach crosses a legal threshold, reporting to regulators or law enforcement may be required. In this episode, we examine the processes and obligations associated with regulatory reporting under frameworks like GDPR, HIPAA, PCI DSS, and state-level data breach laws. You’ll learn what types of incidents trigger mandatory disclosure, how quick…
  continue reading
 
Sometimes the most difficult part of a security incident isn’t stopping the threat—it’s explaining what happened to the people affected. In this episode, we explore how organizations communicate with customers, partners, and the media during and after an incident. You’ll learn what kinds of disclosures are required, what language builds trust, and …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play