SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the intersection of cybersecurity, user rights, and the evolving landscape of threats. They explore the impo...
Smartphone Privacy, Know Your Rights (00:24:04)
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the intersection of cybersecurity, user rights, and the evolving landscape of threats. They explore the impo...
BSP Maturity Model - Data Security with guest Amren Gill (01:12:32)
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam, along with expert Amren Gill, delve into the critical topic of data security. They discuss the importance of data classificati...
BSP Maturity Model - Data Security with guest Amren Gill (01:12:32)
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam, along with expert Amren Gill, delve into the critical topic of data security. They discuss the importance of data classificati...
WEF Security Survey, AI Browsers, NTLMv1 (00:36:05)
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the latest AI security concerns facing leaders today. They discuss a World Economic Forum report highligh...
LinkedIn job scams and Zero-Click Gemini Vulnerability (00:28:42)
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the challenges faced in the job market, particularly the rise of scams on platforms like LinkedIn. They emphasize the i...
RC4 Deprecated, Are passkeys still an issue? (00:45:43)
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in Microsoft's security protocols, particularly regarding Kerbroasting and the transition from RC4 ...
Our 2026 Predictions (00:38:52)
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss key cybersecurity predictions for 2026, focusing on the rise of agentic AI, quantum computing threats, deepfakes, the e...
Introducing the BSP Maturity Model for Identity (00:40:46)
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the Security Maturity Model, focusing on identity security. They explore the current state of security practices, ident...
Microsoft Bug Bounty, CISA hiring surge, US goes offensive in cyber ops, OWASP Top 10 (00:42:22)
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in cybersecurity, including Microsoft's overhaul of its bug bounty program, CISA's hiring strategy ...
Salt Typhoon - The Growing China Threat (00:42:01)
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the growing cybersecurity threat posed by the Chinese state-sponsored group, Salt Typhoon. They discuss the group's ...
Chat app vulnerabilities, Use AI or else (00:42:36)
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss vulnerabilities in popular chat applications, particularly focusing on Line and WhatsApp. They explore the implications...
2025 Microsoft Ignite Recap for Security (00:59:30)
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the major announcements from Microsoft Ignite, focusing on the introduction of Security Copilot for Microsoft 365 E5 cu...
Unencrypted Satellite Data, China AI Cyberattack (00:36:56)
SummaryIn this episode of the Blue Security Podcast, hosts Adam Brewer and Andy discuss critical issues surrounding satellite security, particularly the vulnerabilities of unencrypted communications. ...
How Face ID Works, Least Private Browser, Ring and Flock (00:48:24)
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the intricate relationship between privacy and security, particularly focusing on biometric data and the transition ...
Microsoft Digital Defense Report 2025 (01:04:15)
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss Microsoft's Digital Defense Report for 2025. The conversation delves into the critical issues surrounding id...
F5 Breached, Windows 10 EOL, AWS Outage (00:49:03)
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss significant recent cybersecurity events, including the F5 breach attributed to state-backed actors, the impl...
What's new in Microsoft Sentinel (00:37:10)
SummaryIn this episode, Andy Jaw and Adam Brewer discuss the latest updates in Microsoft Sentinel, focusing on the new features such as the Sentinel Data Lake, Sentinel Graph, and the MCP server. They...
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss various topics related to cybersecurity, including the security implications of WhatsApp, the challenges of ...
iPhone MIE, Microsoft - Israel MOD, npm supply chain attacks (00:26:53)
SummaryIn this episode, hosts Andy Jaw and Adam Brewer discuss the newly announced iPhone 17 and its enhanced security features, particularly the memory integrity enforcement that aims to protect user...
Kerberoasting in 2025 (00:35:07)
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the topic of Kerberosting, a known attack method that exploits weaknesses in the Kerberos authentication ...
Advanced Data Protection with Special Guest Amren Gill (01:06:31)
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam celebrate their five-year anniversary with guest Amren Gill, a data security solutions engineer at Microsoft. They delve into t...
Entra News (00:26:48)
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the latest developments in Microsoft security technologies, particularly focusing on Entra and its features ...
FUD and Passkeys (00:41:18)
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the concept of FUD (Fear, Uncertainty, and Doubt) prevalent in the cybersecurity industry. They discuss the implicat...
Microsoft Licensing Overview - Part 3 - Niche Situations and Azure (00:48:36)
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the complexities of Microsoft licensing, focusing on device-based versus user-based licensing, the nuance...
Side 1 av 6
Blue Security - Gratis RSS Feed for Norsk Podcast | OpenPodMe | OpenPodMe - Åpen RSS for Norske Podcaster