show episodes
 
Artwork

1
Office 365 Distilled

Steve & Marijn

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
This podcast is presented by Marijn and Steve; two experienced Microsoft 365 and SharePoint consultants. In each podcast you will get a smile or two with a chunk of interesting and practical help in Microsoft 365. Then you get introduced you to what we hope is a Whisky you have not tasted before.
  continue reading
 
The Intrazone is a show about the Microsoft 365 intelligent intranet, taking you into the building blocks of your Microsoft 365 intranet. It's about how SharePoint, OneDrive, Teams, Yammer and more fit into your everyday work life – with the goal being to share and manage content, knowledge, and applications to empower teamwork throughout your organization.
  continue reading
 
Artwork

1
Office 365 Exposed

Tony Redmond & Paul Robichaux

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Office 365 Exposed delivers high-quality technical insight into what's happening in the world of Office 365 and Exchange Server. Your hosts are Microsoft Exchange MVPs Tony Redmond and Paul Robichaux, both well-known personalities and the authors of many books, magazine articles, blog posts, and rants covering Exchange Server, Office 365, Skype for Business, and even, occasionally, SharePoint.
  continue reading
 
Artwork

1
Security Weekly News (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
Security Weekly News (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Chaos Lever Podcast

Ned Bellavance and Chris Hayner

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Chaos Lever examines emerging trends and new technology for the enterprise and beyond. Hosts Ned Bellavance and Chris Hayner examine the tech landscape through a skeptical lens based on over 40 combined years in the industry. Are we all doomed? Yes. Will the apocalypse be streamed on TikTok? Probably. Does Joni still love Chachi? Decidedly not.
  continue reading
 
Artwork
 
Hosted by Carlos L Chacon, the SQL Data Partners Podcast focuses on Microsoft data platform related topics mixed with a sprinkling of professional development. Carlos and guests discuss new and familiar features and ideas and how you might apply them in your environments. Visit our website for episode show notes at marathonus.com/podcast and leave a comment if you have a topic you think we should discuss. We’ll see YOU on the SQL Trail.
  continue reading
 
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
  continue reading
 
Loading …
show series
 
Welcome to Tech News of the Week! Here's what caught our eye in the past seven days: Scammers are out in full force this summer with hyper-detailed (but totally fake) DMV texts warning about traffic violations. Chris reads one of these gloriously absurd attempts to scare Pennsylvanians into paying fake fines. Spoiler: no, you're not going to lose y…
  continue reading
 
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
  continue reading
 
Spinning rust is still not dead. Despite what some all-flash evangelists want you to believe, hard drives have a lot of life left—and yes, we’re still talking about tape too. While Chris and I enjoy a week off, we’re revisiting one of our favorite topics: storage tech and the slow demise that never quite comes. Spoiler: if you thought 2028 would be…
  continue reading
 
Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
  continue reading
 
This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
  continue reading
 
🔥 The world may be on fire, but at least we’ve got s’mores and dark chocolate (just not 98% cacao, thank you). In this episode, we dunk on tech billionaires with the finesse of a flaming marshmallow and explore the dramatic saga of WordPress—from its humble GPL beginnings to the ego-fueled chaos of its current overlord. Yes, Matt Mullenweg, we’re t…
  continue reading
 
This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
  continue reading
 
CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
  continue reading
 
Live from the M365 Community Conference in Las Vegas, Stephen and Arvind break down the biggest announcements in OneDrive, SharePoint, and Microsoft 365—from mind-blowing Copilot demos to Sync deployment best practices. Plus, guest Vlad Catrinescu shares insights on governance, Copilot readiness, and the power of community. Whether you’re an admin,…
  continue reading
 
Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play