RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Active Directory Podcasts
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
…
continue reading
1
Theatre · The Creative Process: Acting, Directing, Writing & Behind the Scenes Conversations
Acting, Directing, Writing & Behind the Scenes Conversations · Creative Process Original Series
Theatre episodes of the popular The Creative Process podcast. We speak to performers and behind the scenes creatives. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find us on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds of creative people. Conversations with writers, artists & creative thinkers across the Arts & STEM. We discuss their lif ...
…
continue reading
1
Music & Dance: Musicians, Composers, Singers, Dancers, Choreographers, Performers Talk Art, Creativity & The Creative Process
Musicians, Composers, Performers, Dancers, Choreographers...in Conversation: Creative Process Original Series
Music & Dance episodes of the popular The Creative Process podcast. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find our main podcast on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds of creative people. Conversations with writers, artists & creative thinkers across the Arts & STEM. We discuss their life, work & artistic practice. Winners ...
…
continue reading
Do you support Macs in an enterprise computing environment? Our goal is to bring the experience of a conference session to you by featuring knowledgeable and experience Mac system administrators as guests. We cover everything from client management and software deployment to AD integration, server management and more!
…
continue reading
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
1
Poetry: The Creative Process: Poets discuss Poems & Creativity
Writing: Creative Process Original Series
Poetry episodes of the popular The Creative Process podcast. Listen to poets reading their poetry & discuss their lives, work & creative process. Includes environmental poetry, humanities & activism. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find our main podcast on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds of creative people. Conv ...
…
continue reading
Inside IT Automation is a podcast gathering IT professionals who are passionate about automation. Every episode consists of a friendly conversation with a guest who is generally an IT Automation professional. Check our episodes to learn more.
…
continue reading
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
1101
LGBTQ+ Stories: The Creative Process: Gender, Equality, Gay, Lesbian, Queer, Bisexual, Homosexual, Trans Creatives Talk LGBTQ Rights
Gender, Equality, Gay, Lesbian, Queer, Bisexual, Trans Creatives: Creative Process Original Series
LGBTQ+ episodes of the popular The Creative Process podcast. Listen to Gay, Lesbian, Queer, Bisexual, Trans creatives tell their stories, discuss their lives, work & creative process. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find our main podcast on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds of creative people. Conversations with w ...
…
continue reading
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
…
continue reading
Welcome to "Business Tech Playbook" - your go-to podcast for simplifying complex technology and security concepts. As busy executives, we know you need quick, clear, and digestible information. That's why we break down tech and cyber security into straightforward terms, empowering you to lead with confidence in the digital era. Subscribe for your regular dose of insights and stay ahead of the tech curve.
…
continue reading
With thousands of organizations using Microsoft software solutions, One Identity and Microsoft have come together to make Zero Trust Active Directory Security within reach. Cybersecurity starts with identity management. For CISOs and other IT security leaders, this is at the forefront of their minds as they seek solutions to prevent breaches and enable Zero Trust. This podcast series focuses on how Microsoft and One Identity solutions work together to create a Zero Trust security model. Hear ...
…
continue reading
1
How to move Active Directory Source of Authority to Microsoft Entra ID and why
9:41
9:41
Play later
Play later
Lists
Like
Liked
9:41Strengthen your security posture by moving groups and users from Active Directory to Microsoft Entra. This gives you seamless access for your teams, stronger authentication with MFA and passwordless options, and centralized visibility into risks across your environment. Simplify hybrid identity management by reducing dual overhead, prioritizing key…
…
continue reading
1
Cheers to 25 Years of Active Directory - A Happy Hour with Special Guests
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36Join us for a special live stream celebrating 25 years of Active Directory. 🎉 Dive into the past, present, and future of this groundbreaking technology with expert insights, behind-the-scenes stories, and special guest appearances. Share your AD stories with the community. Whether you're an IT veteran or new to the world of directory services, this…
…
continue reading
1
8.4 - CON Men: Wild West Hackin' Fest + GrrCON
26:23
26:23
Play later
Play later
Lists
Like
Liked
26:23On this special Friday Edition of Security Noise, Geoff lets Skyler out of the sound booth and sends him to Deadwood, South Dakota to attend (and speak at) Wild West Hackin' Fest! Skyler also interviews TrustedSec's Senior Security Consultant David Boyd on his WWHF talk on Social Engineering and Principal Security Consultant Adam Compton's GrrCON t…
…
continue reading
1
Fighting Tool Squatting And Prompt Injection & The Security Gaps In MCP – Srajan Gupta
23:41
23:41
Play later
Play later
Lists
Like
Liked
23:41In this episode of the Security Repo Podcast, we welcome Srajan Gupta, a security engineer exploring the evolving security implications of Model Context Protocol (MCP) servers. Shrojan breaks down how MCPs act as AI connectors to external systems and the alarming rise in attack surfaces, including tool squatting and indirect prompt injections. The …
…
continue reading
1
"Everything is Art. Everything is Politics." AI WEIWEI'S TURANDOT Dir. MAXIM DEREVIANKO - Highlights
“So when we decided to do a documentary to follow Ai Weiwei, we knew, of course, it wouldn't be just a simple opera, and we knew he would bring his own very special and original vision. Because, of course, he is not an opera director. From his point of view, it's a challenge, but from another perspective, it’s probably an enrichment for the opera a…
…
continue reading
1
"Everything is Art. Everything is Politics." AI WEIWEI'S TURANDOT Dir. MAXIM DEREVIANKO - Highlights
“So when we decided to do a documentary to follow Ai Weiwei, we knew, of course, it wouldn't be just a simple opera, and we knew he would bring his own very special and original vision. Because, of course, he is not an opera director. From his point of view, it's a challenge, but from another perspective, it’s probably an enrichment for the opera a…
…
continue reading
“Everything is Art. Everything is Politics. I think art competes with reality. And art will give you the last words.” –Ai Weiwei The renowned artist and activist Ai Weiwei has used sculpture, photography, documentaries, and large-scale installations to challenge authoritarian power for decades. But his project at the Rome Opera House, directing Puc…
…
continue reading
“Everything is Art. Everything is Politics. I think art competes with reality. And art will give you the last words.” –Ai Weiwei The renowned artist and activist Ai Weiwei has used sculpture, photography, documentaries, and large-scale installations to challenge authoritarian power for decades. But his project at the Rome Opera House, directing Puc…
…
continue reading
1
Becoming a Cybersecurity Expert with Paula Januszkiewicz
38:22
38:22
Play later
Play later
Lists
Like
Liked
38:22How do you become a cybersecurity expert? While at Cybersecurity Intersection in Orlando, Richard chatted with Paula Januszkiewicz about her career in cybersecurity. Paula talks about insatiable curiosity to understand how things work the way they do - why an exploit happens and following the twists and turns that lead to root cause and permanent s…
…
continue reading
1
The Cyber War We Can’t See with Dr. Chase Cunningham, CSO of Demo-Force.com
29:29
29:29
Play later
Play later
Lists
Like
Liked
29:29This episode features Dr. Chase Cunningham, Chief Strategy Officer at Demo-Force.com. Widely known as “Dr. Zero Trust”, he’s the creator of the Zero Trust Extended Framework and former Forrester principal analyst. With decades of experience supporting the NSA, U.S. Navy, FBI Cyber, and other government missions, Chase brings deep expertise on how n…
…
continue reading
1
Fixing Hiring, Fostering Diversity, and Finding Your Place in Security – Matt Torbin
19:15
19:15
Play later
Play later
Lists
Like
Liked
19:15In this episode of the Security Repo Podcast, we sit down with Matt Torbin to explore his inspiring journey from jazz musician to cybersecurity advocate and leader. We dive deep into the origins and impact of Day of Shecurity, a one-day conference aimed at increasing representation and mentorship for women and non-binary individuals in infosec. Mat…
…
continue reading
It's time to retire NTLM - but how? Richard chats with Steve Syfuhs about the need and challenge of retiring an ubiquitous authentication protocol first used in the 1990s. While guidance to move away from NTLM has been available since 2010, it has only become feasible in the past couple of years, and Microsoft is now providing tooling to make the t…
…
continue reading
1
Dev Engagement in Security: From Content Strategy to Community Strategy with Alyssa Miles
18:44
18:44
Play later
Play later
Lists
Like
Liked
18:44In this episode of the Security Repo Podcast, we chat with Alyssa Miles, a product marketing leader at CyberArk, about building authentic developer communities in the security space. She shares her journey from agency marketing to driving developer engagement, along with insights from Hacker Summer Camp and strategies for enabling community-driven …
…
continue reading
By Amy Norris, Richard Campbell
…
continue reading
1
The Human Side of Cyber Resilience with Jonathon Mayor, Principal Security Consultant for the Americas at Cohesity
32:51
32:51
Play later
Play later
Lists
Like
Liked
32:51This episode features Jonathon Mayor, Principal Security Consultant for the Americas at Cohesity. A founding member of Cohesity’s Security Center of Excellence and the Cyber Event Response Team, Jonathon has more than 20 years of experience in security operations, forensics, and business continuity, with past leadership roles at EMC, Dell, and Veri…
…
continue reading
251
8.3 - Cybersecurity Awareness Month 2025
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02
…
continue reading
Take control of security operations and act fast on high priority threats with Microsoft Security Copilot agents. Automate phishing triage, prioritize alerts, streamline access reviews, and close policy gaps while keeping full control through natural language feedback and recommendations. Reduce repetitive work, cut through alert noise, and focus o…
…
continue reading
1
Copilot now included with Word, Excel, PowerPoint, Outlook & OneNote | Microsoft 365 & Office 365
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10Work efficiently using Microsoft 365 Copilot Chat, now available directly in Word, Excel, PowerPoint, Outlook, and OneNote for everyone with an Office 365 or Microsoft 365 subscription. Summarize long email threads, generate bullet-point executive summaries, create charts, and update presentations—all without leaving your familiar apps. Copilot und…
…
continue reading
1
Beyond Controls: Building Trust and Communication in Security – Featuring AriaDear
19:59
19:59
Play later
Play later
Lists
Like
Liked
19:59In this episode of the Security Repo Podcast, Aria Langer returns to share deep insights from her work in privileged access management and the challenges of implementing security controls without alienating coworkers. She and Dwayne dive into the often-overlooked importance of empathy in cybersecurity, exploring how human connection can make securi…
…
continue reading
How do you know if one of your accounts has been part of a security breach? Richard chats with Troy Hunt about HaveIBeenPwned, a free service that allows individuals to receive notifications when their accounts appear in a security breach. Troy discusses other services available alongside HaveIBeenPwned for sysadmins, including password checking, i…
…
continue reading
1
Copilot Chat for Everyone, AI Agents Everywhere in Teams, and Fighting “Workslop” – Practical 365 Podcast S04E44
1:03:02
1:03:02
Play later
Play later
Lists
Like
Liked
1:03:02Join Steve Goodman and Paul Robichaux as they discuss Microsoft’s latest AI updates – from Copilot Chat coming to all Microsoft 365 apps (no license required) to Teams getting AI agents in meetings, channels, and communities. They also warn about the rise of “AI-generated workslop” cluttering our workflows, and dig into why many Copilot pilot proje…
…
continue reading
1
Misconfigurations, Legacy Landmines, and Tier Zero Truths – Jake Hildreth on Active Directory
21:37
21:37
Play later
Play later
Lists
Like
Liked
21:37In this episode of the Security Repo Podcast, we chat with Jake Hildreth, Principal Security Consultant at Semperis, about the enduring challenges of securing Active Directory in a hybrid cloud world. Jake shares war stories from the field, including dangerously misconfigured environments and the real-world impacts of legacy systems. We also explor…
…
continue reading
PowerShell 1.0 was released on November 14, 2006. It has changed the IT automation landscape forever. We're bringing together well-known members of the PowerShell community for a special livestream to celebrate 18 years of PowerShell! 🚀 Expect stories, tips, learnings and a look back at how PowerShell has grown into this amazing IT automation techn…
…
continue reading
1
Managing Vendor Incidents with Mandi Walls
31:45
31:45
Play later
Play later
Lists
Like
Liked
31:45You're down - is it your servers, or someone else's? While at the Kansas City Developers Conference, Richard sits down with Mandi Walls from Pager Duty about her experiences dealing with incidents involving vendor services. It might be your cloud provider, or some other SaaS element of a pipeline, or even an open-source library dependency in an imp…
…
continue reading
1
Inside the Snowden Breach with Chris Inglis, Former Deputy Director of the NSA
44:55
44:55
Play later
Play later
Lists
Like
Liked
44:55This episode features Chris Inglis, former U.S. National Cyber Director and longtime Deputy Director of the NSA. With over 40 years in national security, Chris was at the center of one of the most high-stakes breaches in U.S. history: the Edward Snowden incident. In this episode, Chris shares what really happened inside the NSA during those critica…
…
continue reading
1351
New collaborative agents in Microsoft 365 Copilot
9:39
9:39
Play later
Play later
Lists
Like
Liked
9:39The newest agents for Microsoft 365 Copilot users can now act as virtual members of your team, helping you stay organized, informed, and secure while you work. Watch how these collaborative agents partner with you in real time across your everyday apps. Knowledge Agent streamlines SharePoint by auto-tagging files, retiring outdated pages, and even …
…
continue reading
1
8.2 - Can You Wear a White Hat After Labor Day?
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39Need to catch up on this summer's security news? In this episode of Security Noise, Geoff and Skyler chat with TrustedSec Founder and CEO Dave Kennedy about recent national security breaches, the role of AI in software development, and the challenges of public awareness regarding cyber threats. How have national security disclosures impacted politi…
…
continue reading
1
How to Make an Algorithm in the Microwave with Poet MAYA SALAMEH
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26“Poetry is like one of the great loves of my life, and I think it's probably the longest relationship I'll ever have. I read a lot of poetry. I also wrote these short stories even when I was pretty young, like in second grade, and the stories kept getting shorter and shorter. My family used to go to Damascus in Syria and Lebanon every summer for th…
…
continue reading