Blue Security

By Andy Jaw & Adam Brewer

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 1
Reviews: 0
Episodes: 185

Description

A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.

Episode Date
Midnight Blizzard Update, CISO Technical Skills, BEC + Automatic Attack Disruption
Mar 26, 2024
Microsoft Secure Recap
Mar 19, 2024
FBI Internet Crimes Report and BEC Protection
Mar 12, 2024
Application Allow Listing, iMessage Post Quantum
Mar 05, 2024
Edge Password Vault, SSO, Domain Admin Creds
Feb 27, 2024
Bitlocker Bypass and USAF Re-org
Feb 20, 2024
Microsoft Sentinel Deep-Dive with Henrik Wojcik
Feb 13, 2024
Cloudflare Hacked, Intune Suite, Apple Stolen Device Protection
Feb 06, 2024
Midnight Blizzard Attack on Microsoft
Jan 30, 2024
X accounts hacked, 23andMe revisited, CA for Entitlement Management
Jan 23, 2024
Entra Join is the way
Jan 16, 2024
Entra improvements, QR Code phishing, AppGuard deprecated
Jan 09, 2024
Common PIM mistakes
Jan 01, 2024
Microsoft Digital Defense Report 2023
Dec 25, 2023
Audits and Data/AI Security with Special Guests Carley Salmon and Megan Maley
Dec 18, 2023
CNAPP - Defender for Cloud Overview
Dec 11, 2023
MeridianLink extortion, Plastic Surgery office breached, AI voice clones
Dec 04, 2023
Microsoft Ignite 2023 - Part 2
Dec 04, 2023
Microsoft Ignite 2023 - Part 1
Nov 20, 2023
Okta Breach Follow-up and Passkeys
Nov 13, 2023
SEC charges Solarwinds CISO & Backing up and Archiving M365 data
Nov 12, 2023
23andMe, Okta breach, MDE Automatic Attack Disruption
Oct 30, 2023
Entra Web-sign in, MDE Device Control, Imposter Syndrome
Oct 23, 2023
Conditional Access Gap Analysis
Oct 19, 2023
Unpopular Cybersecurity Opinions
Oct 09, 2023
JCI Ransomware, Ransomware Negotiations, CISA guidance
Oct 02, 2023
MITRE Engenuity ATT&CK Evaluations and Insider Risk
Sep 26, 2023
MGM Resorts Security Incident
Sep 18, 2023
Apple 0-day's, Storm-0558 follow up, MFST Conditional Access Dashboard
Sep 11, 2023
Data Security in Microsoft 365
Sep 04, 2023
Side channel attack, White House cybersecurity workforce plan, IBM Cost of a Data Breach
Aug 28, 2023
Red Teaming with Special Guest 23P
Aug 21, 2023
Securing Entra External Identities
Aug 14, 2023
Educating Defenders with Special Guest Howard Friedman, Ascent Solutions
Aug 07, 2023
New SEC and FCC rules, and Samsung device security
Jul 31, 2023
Expanded M365 audit logs, Threads, new Entra features
Jul 24, 2023
Storm-0558 - Attack on Exchange Online
Jul 17, 2023
Common M365 Misconfigurations
Jul 10, 2023
What's new with Intune and Entra
Jul 03, 2023
OWASP Top 10 and Top 10 for LLM
Jun 26, 2023
Network Security 101
Jun 19, 2023
MSSP's
Jun 12, 2023
Protecting M365 from on-premise attacks
Jun 05, 2023
Microsoft Build 2023 Recap
May 30, 2023
Limiting Chatgpt
May 22, 2023
Apple Rapid Security, Data Encryption, Layoffs & Insider Risk
May 15, 2023
Microsoft Secure Score
May 08, 2023
Workplace Join, Azure AD Join, and Windows (Cloud) LAPS
May 01, 2023
Meta E2E, Proton Pass, LI Verified ID, iPhone Security
Apr 24, 2023
Security Copilot, Incident Response Retainer, Exchange Server On-Prem
Apr 17, 2023
State of Identity 2023
Apr 10, 2023
News Update - MDVM, SEC Guidance, M365 Copilot
Apr 03, 2023
Protect your home network by the NSA
Mar 27, 2023
White House National Cybersecurity Strategy
Mar 20, 2023
Intune Suite
Mar 13, 2023
Lastpass Incident Update
Mar 06, 2023
Road to the Cloud
Feb 27, 2023
Identity Trends
Feb 20, 2023
Identity Governance and Administration
Feb 13, 2023
ChatGPT
Feb 06, 2023
Tech Layoffs
Jan 30, 2023
Operational Excellence
Jan 23, 2023
News Catchup
Jan 16, 2023
Windows Defender Firewall
Jan 09, 2023
What we learned in 2022 in cybersecurity
Jan 02, 2023
Windows Autopatch with Special Guest Adam Nichols
Dec 26, 2022
Passkeys
Dec 19, 2022
Microsoft's Insider Risk Report
Dec 12, 2022
DDoS Protection
Dec 05, 2022
Microsoft's Digital Defense Report
Nov 28, 2022
How to Mastodon
Nov 21, 2022
Patch Tuesday, Medibank Breach, Twitter Meltdown
Nov 14, 2022
Old Phishing Tricks Are Still Working
Nov 07, 2022
SOCRadar and Ignite 2022 highlights
Oct 31, 2022
IBM Incident Responder Report
Oct 24, 2022
BYOD Zero-Trust Architecture
Oct 17, 2022
MDE Tamper Protection
Oct 10, 2022
Active Directory Security Tips
Oct 03, 2022
Kerberoasted
Sep 26, 2022
Microsoft Teams, Patreon, and Uber
Sep 19, 2022
Cloudflare and Kiwi Farms
Sep 12, 2022
Cloud Security 101
Sep 05, 2022
Beyond E5, Rebranding, Public Previews in Microsoft Security
Aug 29, 2022
Quantum & Cryptography Follow-up, TikTok, and Janet Jackson
Aug 22, 2022
Post Quantum Series - Part 2 - Quantum Cryptography
Aug 15, 2022
Post Quantum Series - Part 1 - Quantum Computers
Aug 08, 2022
Exchange Online Protection Deep-Dive
Aug 01, 2022
Personal and Organization Privacy
Jul 25, 2022
Microsoft Security News
Jul 18, 2022
Risk Management and Data Protection
Jul 11, 2022
Basic Auth, Zero Days, & Burnout
Jul 04, 2022
Secure Authentication to Azure VMs
Jun 27, 2022
Don't Phish Me, Bro
Jun 20, 2022
Securing Guest Access to M365
Jun 12, 2022
Windows Defender Exploit Guard
Jun 06, 2022
Patch Management
May 30, 2022
Domain Controller Security
May 23, 2022
Cyber Threat Intelligence with Special Guest Charity Wright
May 16, 2022
Andy was hacked!
May 09, 2022
MFA Bombing
May 02, 2022
Interview with Special Guest Christina Morillo
Apr 25, 2022
VPNs vs SDPs
Apr 18, 2022
Okta Says Sorry, Fake Warrants, New PCI Reqs
Apr 11, 2022
LAPSUS$
Apr 04, 2022
Infosec News Catch Up
Mar 28, 2022
Helpdesk Security
Mar 21, 2022
War in the Digital Age
Mar 14, 2022
Windows Hello for Business Revisited
Mar 07, 2022
Password Cracking
Feb 28, 2022
Geopolitical Crises and Cybersecurity
Feb 21, 2022
Windows Defender Application Control
Feb 14, 2022
Tabletop Scenarios with Special Guests Nate Gardner and Gavin Ashton
Feb 07, 2022
News Smash
Jan 31, 2022
Windows Device Management with Special Guest Shannon Fritz
Jan 24, 2022
F12 and Find Out
Jan 17, 2022
Digital Asset Management
Jan 10, 2022
A look back on 2021
Jan 03, 2022
Work Life Balance
Dec 27, 2021
Threat and Vulnerability Management
Dec 20, 2021
Log4Shell
Dec 13, 2021
Security Champions
Dec 06, 2021
Things are getting better
Nov 29, 2021
Zero Trust, Amazon Security, and other news
Nov 22, 2021
Ignite 2021 Fall Highlights
Nov 15, 2021
Cybersecurity Talent Gap
Nov 08, 2021
Microsoft Digital Defense Report, Consumer Expectations, and Gartner
Nov 01, 2021
Windows 365 with Special Guest Bradley Dupay
Oct 25, 2021
Facebook Outage Learnings and Windows 11 security
Oct 18, 2021
You are going to be a victim of ransomware
Oct 11, 2021
TPM design limitations and Apple-Google app store actions
Oct 04, 2021
Protonmail kerfuffle
Sep 27, 2021
Misconceptions about MDM
Sep 20, 2021
One year anniversary!
Sep 13, 2021
Apple's Protections for Children
Sep 06, 2021
Security News Edition: Lockfile, Razer, and T-mobile
Aug 30, 2021
Windows Hello for Business
Aug 23, 2021
Mistakes that hinder a security team's success with Special Guest Nate Gardner
Aug 16, 2021
Secure Privileged Access
Aug 09, 2021
Windows Defender Application Guard
Aug 02, 2021
Pegasus, Twitter MFA, & Underfunding Infosec
Jul 25, 2021
CISA's RVA findings and what it means for organizations
Jul 19, 2021
The Tech We Use
Jul 12, 2021
Information Protection with Special Guest Rachel O'Shea
Jul 05, 2021
Should you block or allow this app?
Jun 28, 2021
Special Episode - Programming Note
Jun 21, 2021
Windows Defender Credential Guard
Jun 21, 2021
The True Cost of Ransomware
Jun 14, 2021
Digital Every Day Carry (EDC)
Jun 07, 2021
That Infosec Op-Ed
May 31, 2021
Information Security Leadership with Special Guest Doug Turecek
May 24, 2021
Colonial Pipeline and other news
May 17, 2021
Security Change Management
May 10, 2021
Browser Security
May 03, 2021
Mentorship with Special Guest Matt Wood
Apr 26, 2021
M365 Productivity Tips and Tricks
Apr 19, 2021
Zscaler Security with Raja Khalid
Apr 12, 2021
Mac Management with Special Guest Matthew Ward and Matt Benyo
Apr 05, 2021
How to get into cybersecurity and the skills you need
Mar 29, 2021
Azure Sentinel with Special Guest John Joyner
Mar 21, 2021
Physical Security with Special Guest Wesley Strey
Mar 15, 2021
Say Goodbye to Domain Join with Special Guest Shannon Fritz
Mar 08, 2021
Cloud Application Security Brokers
Feb 28, 2021
Password Managers
Feb 22, 2021
What is EvilGinx and How do you protect against it?
Feb 15, 2021
Modern Device Management
Feb 08, 2021
Real-world Ransomware Experience with Special Guest Gavin Ashton
Feb 01, 2021
Application Security with Special Guest Tanya Janca
Jan 25, 2021
Secure Messaging
Jan 18, 2021
Solarwinds Revisited and Tech Policy under a Biden Administration
Jan 11, 2021
Information Security Tips & Tricks for Parents
Jan 04, 2021
Merry Christmas! Learn how to spin up your own VM lab and dev environments
Dec 27, 2020
Our thoughts on Fireeye, Solarwinds, and Sunburst
Dec 21, 2020
Passwordless Authentication
Dec 14, 2020
Conditional Access
Dec 07, 2020
Work from Home - Tips and Tricks
Nov 30, 2020
Our thoughts on Chris Krebs, Infosec Job Security, and Infosec Qualifications
Nov 23, 2020
Active Directory Security with Special Guest Morgan Patzwald
Nov 16, 2020
Single-Sign On (SSO) and Self-Service Password Reset (SSPR)
Nov 09, 2020
How did we get into information security and career progression advice
Nov 02, 2020
Ransomware protection - Part 4 - Windows 10 Security, Network Segmentation, Detection and Recovery
Oct 26, 2020
Ransomware Protection - Part 3 - Admin Rights, Email Protection, Phishing Training
Oct 19, 2020
Ransomware Protection - Part 2 - EDR, Patching, and Pentesting
Oct 12, 2020
Ransomware Protection - Part 1 - Soft Skills and Endpoint Protection
Oct 05, 2020
Enabled MFA!
Sep 28, 2020
Geo-restricting IP addresses, Password policies, Defense against password spray attacks
Sep 21, 2020