Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Active Directory Podcasts

show episodes
 
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
  continue reading
 
Artwork

1
MacEnterprise Podcast

The MacEnterprise Podcast Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Do you support Macs in an enterprise computing environment? Our goal is to bring the experience of a conference session to you by featuring knowledgeable and experience Mac system administrators as guests. We cover everything from client management and software deployment to AD integration, server management and more!
  continue reading
 
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
  continue reading
 
Artwork

1
Theatre · The Creative Process: Acting, Directing, Writing & Behind the Scenes Conversations

Acting, Directing, Writing & Behind the Scenes Conversations · Creative Process Original Series

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Theatre episodes of the popular The Creative Process podcast. We speak to performers and behind the scenes creatives. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find us on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds of creative people. Conversations with writers, artists & creative thinkers across the Arts & STEM. We discuss their lif ...
  continue reading
 
Artwork

1
Microsoft Mechanics Podcast

Microsoft Mechanics

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
  continue reading
 
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Artwork

1
Security Noise

TrustedSec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
  continue reading
 
Artwork
 
Poetry episodes of the popular The Creative Process podcast. Listen to poets reading their poetry & discuss their lives, work & creative process. Includes environmental poetry, humanities & activism. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find our main podcast on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds of creative people. Conv ...
  continue reading
 
Inside IT Automation is a podcast gathering IT professionals who are passionate about automation. Every episode consists of a friendly conversation with a guest who is generally an IT Automation professional. Check our episodes to learn more.
  continue reading
 
Artwork

1
LGBTQ+ Stories: The Creative Process: Gender, Equality, Gay, Lesbian, Queer, Bisexual, Homosexual, Trans Creatives Talk LGBTQ Rights

Gender, Equality, Gay, Lesbian, Queer, Bisexual, Trans Creatives: Creative Process Original Series

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
LGBTQ+ episodes of the popular The Creative Process podcast. Listen to Gay, Lesbian, Queer, Bisexual, Trans creatives tell their stories, discuss their lives, work & creative process. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find our main podcast on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds of creative people. Conversations with w ...
  continue reading
 
Artwork

1
Data Center Therapy

IVOXY Consulting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
  continue reading
 
Artwork

1
Business Tech Playbook

Etop Technology

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to "Business Tech Playbook" - your go-to podcast for simplifying complex technology and security concepts. As busy executives, we know you need quick, clear, and digestible information. That's why we break down tech and cyber security into straightforward terms, empowering you to lead with confidence in the digital era. Subscribe for your regular dose of insights and stay ahead of the tech curve.
  continue reading
 
Artwork

1
Better Together

Tech Demand

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
With thousands of organizations using Microsoft software solutions, One Identity and Microsoft have come together to make Zero Trust Active Directory Security within reach. Cybersecurity starts with identity management. For CISOs and other IT security leaders, this is at the forefront of their minds as they seek solutions to prevent breaches and enable Zero Trust. This podcast series focuses on how Microsoft and One Identity solutions work together to create a Zero Trust security model. Hear ...
  continue reading
 
Loading …
show series
 
It's never been easier to build, optimize, and govern AI apps and agents that understand your business context and deliver business impact. Our unified, interoperable AI platform enables developers to build faster and smarter, while organizations gain fleetwide security and governance in a unified portal. Yina Arenas, Microsoft Foundry CVP, shares …
  continue reading
 
Who will win Hacker Family Feud? On this special, year-end episode of Security Noise, we are gathering the fam around the digital fireplace for a hacker-themed game night! Geoff and Skyler are having TrustedSec's Jason Lang, Scott White, Rob Simon, Paul Koblitz, Martin Bos, and Chris Boesch duke it out to see which team can guess the most popular a…
  continue reading
 
Ground your AI agents on your organization's knowledge, pulling from multiple sources at once, connecting the dots automatically, and getting more accurate, context-rich answers without doing manual orchestration with Foundry IQ in Microsoft Foundry. Navigate complex, distributed data across Azure stores, SharePoint, OneLake, MCP servers, and even …
  continue reading
 
What does it take to be ready to deploy M365 Copilot in your organization? Richard talks to Nikki Chapple about her latest incarnation of the M365 Copilot Readiness Checklist, working step-by-step to bring M365 Copilot into the organization without causing data leak issues. Nikki discusses utilizing existing tools to accurately identify sensitive d…
  continue reading
 
This episode features Daniel Stefaniak, Vice President Architect - Cybersecurity and Identity at JPMorgan Chase. With deep experience as an IT architect, consultant, and technical program manager, Daniel has helped design and deploy large-scale IAM and CIAM solutions that support millions of users. He is widely recognized for his expertise in Activ…
  continue reading
 
The seasonal gift show is back - Joey Snow and Rick Claus bring their lists of great gifts for sysadmins. You know they're impossible to buy for, so we are making it easier for you with a range of prices and seriousness for your favorite sysadmin. Useful gadgets, upgrades to older devices, and some fun stuff that reminds the sysadmins in your life …
  continue reading
 
Ignite 2025 delivered major updates across Microsoft 365. In this episode, we discuss: Agent 365: Public preview now. Manage AI agents like identities with Entra Agent ID, renamed app registrations, and Teams app visibility. Copilot updates: Work IQ adds proactive personalization. Voice in Outlook Mobile for hands-free triage and scheduling (early …
  continue reading
 
Build powerful AI apps that run locally on any device—Windows, macOS, or mobile—without relying on the cloud using Foundry Local. Leverage full hardware performance, keep data private, reduce latency, and predict costs, even in offline or low-connectivity scenarios. Simplify development and deploy AI apps across diverse hardware and OS platforms wi…
  continue reading
 
Unify your security data and use AI to reason over your entire digital estate with Microsoft Sentinel. See how threats evolve in real time, map attack paths, and understand which assets are most at risk. Visualize relationships across users, devices, and resources to pinpoint vulnerabilities and focus your response where it matters most. Using natu…
  continue reading
 
Connect users to on-premises resources while enforcing Conditional Access policies, including MFA, and eliminate the need for VPNs using Secure Access Service Edge with Microsoft Entra. Route authentication through Microsoft Entra before granting resource access, even within legacy on-premises systems. Boost performance with intelligent local acces…
  continue reading
 
Secure sign-in across all your devices without relying on passwords or extra apps using passkeys in Microsoft Entra. Register, sync, and use passkeys with just your device's camera and biometrics, making authentication seamless, fast, and phishing-resistant. As an admin, control who uses which passkey type, streamline recovery with Verified ID, and…
  continue reading
 
Attackers and threat actors use command and control techniques, also known as C2, to gain access to networks and communicate with compromised devices. On this episode of Security Noise, Geoff and Skyler are joined by Principal Research Analyst Scott Nusbaum to discuss C2 techniques. Listen as they cover how different types of attackers typically us…
  continue reading
 
Locate, assess, and prioritize high-risk data across Microsoft and non-Microsoft services using Microsoft Purview Data Security Posture Management (DSPM). Identify sensitive files, understand emerging data risks, and focus remediation efforts where they matter most without slowing down productivity. You can also remediate oversharing, enforce data …
  continue reading
 
How can Azure Site Reliability Engineering Agents help your Azure infrastructure? While at Techorama in Utrecht, Richard chatted with Deepthi Chelupati about the LLM service that helps you build and maintain more reliable applications and infrastructure in Azure. Deepthi talks about monitoring deployment problems, handling errors in production, and…
  continue reading
 
Automate real work, modernize app delivery, and keep users productive from any device with Windows 365 for Agents. Assign AI agents their own Cloud PCs to complete tasks in your apps and workflows using natural-language instructions to eliminate fragile UI-based automation and accelerate scalable, resilient processes across your organization. Publi…
  continue reading
 
This episode features Nathan Wenzler, Field Chief Information Security Officer at Optiv. With nearly 30 years of experience leading cybersecurity programs across government agencies, nonprofits, and Fortune 1000 companies, Nathan has spent his career at the intersection of people, process, and technology. He’s helped organizations redefine what it …
  continue reading
 
How resilient are your Azure deployments? Richard chats with Chris Ayers about his work on Azure reliability - not only for customers using Azure, but for Azure itself! Chris focuses on the Well-Architected Framework as a guideline for thinking through all the elements of resiliency in Azure. As with all things, there are trade-offs of cost and rel…
  continue reading
 
“And I think there's also just something about an unfettered or uncensored id that is so captivating. We all have that fantasy of doing exactly what we want with no consequences and sort of letting that go. I think when you see an athlete at the peak of their game, doing that embodied thing and living that dream, or when someone has actually done h…
  continue reading
 
The future of updating Windows is here! Richard talks to Aria Hanson about Windows Autopatch, the consolidation of Microsoft's various update mechanisms to keep your managed Windows devices current. Aria discusses the deprecation of Windows Server Update Services (WSUS) and the move to always-on cloud updates. The conversation turns to the various …
  continue reading
 
This episode features Heather Costa, Director of Technology Resilience at Mayo Clinic. With over two decades of experience building resilience programs at leading healthcare institutions, Heather has redefined what it means to prepare for and thrive through disruption. From Cleveland Clinic to Mayo Clinic, she’s led enterprise-wide recovery strateg…
  continue reading
 
Red Teaming 101: understand your target before you attack. On this episode, we invited two heavy hitters, Principal Security Consultants Hans Lakhan and Oddvar Moe on the show to talk about Red Team operations. We discuss footprinting and reconnaissance techniques including identifying a target's online presence, the tools and methods used for reco…
  continue reading
 
In this episode of the Practical 365 Podcast, Steve Goodman and Paul Robichaux discuss major Exchange updates – including the fallout from a recent AWS outage, Microsoft’s new tools to finally remove your last on-premises Exchange server, the final patches for Exchange 2016/2019, and a new auto-archiving feature for Exchange Online. They also dive …
  continue reading
 
Turn raw Excel data into actionable insights, visual dashboards, and KPIs in minutes. With Agent Mode, automate complex analysis, create pivot tables, and build interactive dashboards without manual setup. Streamline text analysis, formula generation, and complex calculations right inside Excel. Use the Copilot function to categorize feedback, scor…
  continue reading
 
How can the new AI tools help DBAs? Richard chats with Grant Fritchey about his experiences using various types of LLMs to help with his work as a DBA. Grant discusses having an LLM open as a side window to pass questions by, such as ideas for tuning, query optimization, scripts, and so on. Not all LLMs are the same - it's worth experimenting with …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play