The Azure Security Podcast

The Azure Security Podcast

https://open.spotify.com/show/6AZVRZWttZdYkvlSAXjiGK

A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/ ©2020-2021 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.

Posts about

  • Azure Azure
    8

The Azure Security Podcast

Episode 73: Microsoft Defender for Cloud as Code

Episode 73: Microsoft Defender for Cloud as Code

Episode 70: Microsoft Purview

Episode 70: Microsoft Purview

SQL Server 2022

SQL Server 2022

Privileged Access

Privileged Access

Workload Identities

Workload Identities

Microsoft Defender for Threat Intelligence

Microsoft Defender for Threat Intelligence

The SQL Server Permission Model Explained

The SQL Server Permission Model Explained

Microsoft Entra Permissions Management

Microsoft Entra Permissions Management

Microsoft Defender for Endpoint Tamper Protection

Microsoft Defender for Endpoint Tamper Protection

Securing Operational Technology (OT)

Securing Operational Technology (OT)

Microsoft Defender for Cloud - AWS and GCP

Microsoft Defender for Cloud - AWS and GCP

Chief Information Security Officer (CISO) Workshop

Chief Information Security Officer (CISO) Workshop

Innovations in Azure Confidential Computing

Innovations in Azure Confidential Computing

Microsoft Sentinel Content Hub

Microsoft Sentinel Content Hub

Advanced Threat Hunting with Microsoft 365 Defender

Advanced Threat Hunting with Microsoft 365 Defender

Practical Zero Trust

Practical Zero Trust

Azure SQL Managed Instance Windows Authentication

Azure SQL Managed Instance Windows Authentication

Azure SQL Database Ledger

Azure SQL Database Ledger

Microsoft Defender for Containers

Microsoft Defender for Containers

Updates to CosmosDB Security

Updates to CosmosDB Security

Microsoft Cybersecurity Reference Architectures

Microsoft Cybersecurity Reference Architectures

RiskIQ Explained

RiskIQ Explained

Is this your blog?

Claim this blog to manage blog details.

Claim