Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Microsofts Security Podcasts
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Security Unlocked presents The BlueHat Podcast From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions. Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and crea ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Focused on Microsoft AI, Security and ERP/CRM.
…
continue reading
With more than 30 years of experience covering Microsoft, Directions on Microsoft provides unique perspectives about the shifts in Microsoft technologies, roadmaps and licensing policies that matter most to enterprise-size companies. Twice each month industry veteran Mary Jo Foley interviews a different Directions analyst for informed insights and advice to help you derive full value from your Microsoft investments.
…
continue reading
Welcome to the Microsoft Community Insights Podcast, where we explore the world of Microsoft Technologies. Interview experts in the field to share insights, stories, and experiences in the cloud. if you would like to watch the video version you can watch it on YouTube below https://youtube.com/playlist?list=PLHohm6w4Gzi6KH8FqhIaUN-dbqAPT2wCX&si=BFaJa4LuAsPa2bfH Hope you enjoy it
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
M365 Voice is a weekly podcast dedicated to share information with the community about the Microsoft 365 platform that includes Office 365, Windows 10 and EMS. Our podcasts will be 20 minutes each and will cover new features, updates, best practices and other ideas about the platform. We will also host guests from the community and from different Microsoft Product Group members.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Welcome to Ragnar365 Nuggets, Ragnar Heil's short news and personal insights about Microsoft 365 Intelligent Workplace. Focus Areas: Microsoft Teams, SharePoint, Outlook, OneDrive, Copilot, Microsoft Viva, Employee Experience, Governance, Compliance, Power Platform etc)
…
continue reading
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading

1
SANS Stormcast Thursday, August 21st, 2025: Airtel Scans; Apple Patch; Microsoft Copilot Audit Log Issue; Password Manager Clickjacking
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
…
continue reading

1
Microsoft Security Licensing Part 1
1:02:36
1:02:36
Play later
Play later
Lists
Like
Liked
1:02:36Summary Hosts Andy and Adam discuss the structure of enterprise agreements, the differences between Office 365 and Microsoft 365, and the transition from consumer-focused to enterprise-focused offerings. They explain the historical context of Microsoft's licensing evolution, the role of enterprise agreements, and the introduction of the Microsoft C…
…
continue reading

1
Canadian House of Commons Breach Tied to Microsoft SharePoint Zero-Day
10:49
10:49
Play later
Play later
Lists
Like
Liked
10:49On August 8th, 2025, hackers breached the Canadian House of Commons by exploiting a critical Microsoft SharePoint zero-day vulnerability—CVE-2025-53770—with a severity score of 9.8. The attack compromised a database containing sensitive employee information, including names, job titles, office locations, email addresses, and technical details about…
…
continue reading

1
North Korean crypto theft, Microsoft rolls out back up, four charged in global scheme
9:07
9:07
Play later
Play later
Lists
Like
Liked
9:07North Korean crypto theft Microsoft rolls out PC back up during attack U.S. charges four in $100M global fraud scheme Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-…
…
continue reading

1
Episode 39 Security Copilot - Sentence Syntax with Mona Ghadiri
1:07:38
1:07:38
Play later
Play later
Lists
Like
Liked
1:07:38Syntax in security might sound technical and dry, but as Mona Ghadiri reveals, it's actually the secret sauce that determines whether your AI security tools deliver inconsistent results or game-changing efficiency. This eye-opening conversation explores how treating Security Co-Pilot prompts as code transforms security operations. Mona, a Microsoft…
…
continue reading

1
Episode 116: Microsoft Sentinel Data Lake
40:03
40:03
Play later
Play later
Lists
Like
Liked
40:03In this episode Michael, Sarah and Mark talk to Mark Kendrick about Microsoft Sentinel Data Lake. We also cover news about The Open Group - Roles and Glossary standards, Security Adoption Module 5 - Data Security, Microsoft Azure Cloud HSM, WAF and Containers, PostgreSQL and PowerBI, Azure Managed Lustre, and more. Also, Sarah mentions some Develop…
…
continue reading

1
Security prioritization, road mapping, and ROI in small businesses
1:06:44
1:06:44
Play later
Play later
Lists
Like
Liked
1:06:44The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! This time, Accidental CISO is joined by guest host Kevin Jackson. Kevin is another long-time industry veteran with experience in both the government and private sectors. He's a former …
…
continue reading

1
Apple zero-day patch, Jailbreaking ChatGPT-5 Pro, 7-year old Cisco Vulnerability exploited
8:57
8:57
Play later
Play later
Lists
Like
Liked
8:57A patch today keeps the zero-day away Jailbreaking ChatGPT-5 Pro The thing about vulnerabilities is they stay vulnerable Huge thanks to our sponsor, Conveyor It’s Thursday. Have you been personally victimized by a portal security questionnaire this week? Most solutions just give you a browser extension to copy and paste answers in, still leaving ho…
…
continue reading
What's coming in C#14? Carl and Richard chat with Dustin Campbell about the next version of C#, discussing what it takes to continue advancing software development in the Microsoft ecosystem. Dustin discusses how features are selected from version to version, including long-developed features like extension members, which have been in development f…
…
continue reading

1
PyPI Cracks Down on Domain Expiration Attacks to Protect Python Packages
45:01
45:01
Play later
Play later
Lists
Like
Liked
45:01The Python Package Index (PyPI), the backbone of the global Python ecosystem, has rolled out new security safeguards aimed at stopping a dangerous form of supply-chain attack: domain resurrection attacks. These attacks exploit a subtle but devastating weakness—when a maintainer’s email domain expires, attackers can re-register it, hijack the email,…
…
continue reading
Topics: Focused on Microsoft AI, Security and ERP/CRM. For Business Leaders For Tech Leaders AI Trends: OpenAI, Google Gemini, MIT-Review.By Sai Turlapati
…
continue reading

1
AI Joins the Fight Against Exploits: Google and Mozilla Patch Dangerous Vulnerabilities
59:42
59:42
Play later
Play later
Lists
Like
Liked
59:42Both Google and Mozilla have rolled out urgent security updates to patch multiple high-severity vulnerabilities in their flagship browsers—Google Chrome and Mozilla Firefox—underscoring the constant arms race between developers and cyber attackers. Google’s update addresses a critical out-of-bounds write vulnerability (CVE-2025-9132) within Chrome’…
…
continue reading

1
Cyberattack Bricks Speed Cameras – 2025-08-18
58:10
58:10
Play later
Play later
Lists
Like
Liked
58:10Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — The gif that keeps on giffing 01:46 - Cyberattack Bricks Speed Cameras – BHIS - Talkin’ Bout [infosec] News 2025-08-18 02:39 - Story # 1: Perplexity made a sky-high $34.5 billion bid for Google Chrome — a bold and unusual move in the midst…
…
continue reading
Microsoft releases emergency out-of-band (OOB) Windows updates. Trump targets NSA’s leading AI and cyber expert in clearance revocations. A breach may have compromised the privacy of Ohio medical marijuana patients. Cybercriminals exploit an AI website builder to rapidly create phishing sites. Warlock ransomware operators target Microsoft’s SharePo…
…
continue reading

1
Britain Backs Down: UK Drops Encryption Backdoor Demand on Apple
20:29
20:29
Play later
Play later
Lists
Like
Liked
20:29A major international clash over encryption has come to a dramatic resolution. Earlier this year, the U.K. government, acting under its controversial Investigatory Powers Act of 2016 (IPA)—better known as the “Snoopers’ Charter”—issued a secret Technical Capacity Notice to Apple, demanding that the company weaken its Advanced Data Protection (ADP) …
…
continue reading

1
PipeMagic Backdoor: How Ransomware Actors Exploited a Windows Zero-Day
54:55
54:55
Play later
Play later
Lists
Like
Liked
54:55In early 2025, Microsoft and security researchers uncovered PipeMagic, a modular and memory-resident backdoor that has been quietly leveraged in ransomware campaigns worldwide. Disguised as a legitimate ChatGPT desktop application, this sophisticated malware granted persistent access, precise control, and stealthy communication channels to its oper…
…
continue reading

1
270,000 Intel Employee Records at Risk from Authentication Bypass and Hardcoded Credentials
36:28
36:28
Play later
Play later
Lists
Like
Liked
36:28In late 2024, Intel faced a major cybersecurity wake-up call when security researcher Eaton Zveare uncovered a series of vulnerabilities inside the company’s internal systems—flaws that exposed employee and supplier data at unprecedented scale. These vulnerabilities, later confirmed and patched by Intel, included authentication bypasses in web appl…
…
continue reading
In this week's episode, we look at recent Microsoft Tech updates. By popular request, we're expanding the scope beyond just Azure to include Microsoft 365, Power Platform, and similar Microsoft platforms and capabilities. What's new? What's interesting? What's retiring? (00:00) - Intro and catching up. (04:15) - Show content starts. Show links - Cr…
…
continue reading

1
EP 139 Hard Landings, Stronger Standings: Matt Hill’s Journey and Leadership Lessons from the Paras to Softer Landings in Security
48:12
48:12
Play later
Play later
Lists
Like
Liked
48:12Send us a text “From the drop zone to the boardroom — Matt Hill reveals how hard landings and soldier grit forge stronger, smarter security leaders.” BIO Matt Hill is a former Parachute Regiment Officer, Farmer, Martial Artist, and teacher of Systema — the natural movement based Russian Martial art blending health and real work self defence skills.…
…
continue reading

1
UK drops Apple backdoor mandate, Allianz Life breach impacts 1.1M, attack stifles speed cameras
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13UK agrees to drop 'backdoor' mandate for Apple devices Massive Allianz Life data breach impacts 1.1M people Speed cameras knocked out after cyber attack Huge thanks to our sponsor, Conveyor If portal questionnaires were a person, you’d block them by now. Endless clicks, bad navigation, and expanding questions stacked like russian nesting dolls, all…
…
continue reading

1
Risky Business #803 -- Oracle's CSO Mary Ann Davidson quietly departs
58:28
58:28
Play later
Play later
Lists
Like
Liked
58:28On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Oracle’s long term CSO departs, and we’re not that sad about it Canada’s House of Commons gets popped through a Microsoft bug Russia degrades voice calls via Whatsapp and Telegram to push people towards Max South-East Asian scam compounds are also be…
…
continue reading

1
SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
…
continue reading

1
How Social Engineering and Vendor Weaknesses Led to Allianz Life’s Massive Breach
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45In July 2025, Allianz Life Insurance Company of North America confirmed a data breach impacting over 1.1 million customers, financial professionals, and employees—a stark reminder of how vulnerable even the most established financial institutions remain to evolving cyber threats. The breach stemmed from a third-party vendor compromise, specifically…
…
continue reading
How do you secure your organization's data to let AI technologies work safely? Richard chats with Martina Grom about her experiences helping sysadmins responsibly bring the power of Microsoft M365 Copilot into their organizations. Martina discusses setting up security and monitoring with tools like Microsoft Purview, enabling visibility into where …
…
continue reading