Got ideas about Microsoft 365? Want your own episode? → come build this with me on LinkedIn

Microsoft Security Podcast – Identity, Cloud & Enterprise Protection Episodes

Security within the Microsoft ecosystem is deeply integrated across identity, endpoints, cloud services, and data platforms. Security Talk focuses on understanding Microsoft security architecture as an interconnected system rather than isolated tools and dashboards.

In this category, we examine identity security using Entra ID, Conditional Access, and privileged access models, alongside Microsoft Defender, Purview, and security controls across Microsoft 365 and Azure. Episodes explore how attackers exploit misconfigurations, how security signals propagate across services, and why many security incidents stem from architectural assumptions rather than missing features.

Security Talk emphasizes why breaches happen, not just how to configure protection. We discuss threat models, attack paths, lateral movement, and the operational trade-offs between security, usability, and automation. Particular focus is given to identity-centric security, which has become the primary control plane for modern Microsoft environments.

This category is intended for security professionals, architects, and IT decision-makers who need to understand Microsoft security beyond checklists and best-practice documents. If you are responsible for protecting identities, data, and cloud workloads within Microsoft platforms, Security Talk provides clear, experience-based insight into building and maintaining resilient security architectures.
Your Microsoft 365 Isn’t Secure: The Hidden Risks You’re Missing
April 4, 2026

Your Microsoft 365 Isn’t Secure: The Hidden Risks You’re Missing

In this episode, we explore why Microsoft 365 environments are often less secure than they appear. While most organizations focus on security tools and settings, the real risk lies in what we call the “invisible tenant” — a hidden layer of misconfigurations, excessive permissions, and missing gover…
Guest: Mirko Peters
The Infrastructure Illusion: How to Map What Your People Actually Do in Microsoft 365
March 24, 2026

The Infrastructure Illusion: How to Map What Your People Actually Do in Microsoft 365

Most organizations think they understand their infrastructure. They see tools, licenses, configurations… dashboards that suggest control. But none of that tells you what’s actually happening. In reality, your Microsoft 365 environment isn’t just infrastructure—it’s a living system of decisions, beh…
Guest: Mirko Peters
Microsoft 365 Governance: The #1 Mistake 73% of Deployments Make (And How to Fix It)
March 22, 2026

Microsoft 365 Governance: The #1 Mistake 73% of Deployments Make (And How to Fix It)

This episode argues that the biggest governance mistake in Microsoft 365 isn’t misconfiguration—it’s timing. Most organizations treat governance as something to “add later,” but by doing that, they unintentionally design failure into the system from day one.The core idea is that governance isn’…
Guest: Mirko Peters
Microsoft 365 Security: Why Accountability Is the Only Real Security Patch
March 13, 2026

Microsoft 365 Security: Why Accountability Is the Only Real Security Patch

This episode breaks down why Microsoft 365 governance and security are not just technical concerns but organizational responsibilities. It explains how a structured governance framework—built on security, compliance, data protection, and clear ownership—prevents chaos like permission sprawl, data l…
Guest: Mirko Peters
Microsoft Teams Admin Center Is Not the Control Plane: How Entra ID Really Governs Access
Jan. 23, 2026

Microsoft Teams Admin Center Is Not the Control Plane: How Entra ID Really Governs Access

In this episode, we dismantle a common Microsoft Teams governance myth: that the Teams Admin Center is the central command for controlling Teams behavior and enforcing governance.Most organizations treat the Admin Center like a control tower — but it’s actually a downstream service console, not…
Guest: Mirko Peters
Power Platform Governance: Why Your Tenant Is the Real Ris
Dec. 29, 2025

Power Platform Governance: Why Your Tenant Is the Real Ris

Is Power Platform actually dangerous for the enterprise—or is that fear hiding a more uncomfortable truth?In this episode, we dismantle the question executives keep asking: “Is Power Platform secure enough?” The answer is sharper than most teams expect. Yes—Microsoft’s Power Platform security i…
Guest: Mirko Peters
How to Stop Shadow IT in Microsoft Foundry Before It Starts
Dec. 28, 2025

How to Stop Shadow IT in Microsoft Foundry Before It Starts

This episode opens with a blunt warning: Microsoft Foundry isn’t just another AI feature you can casually approve and forget. It’s an agent factory, and if execution comes before governance, you are almost guaranteed to create the next generation of shadow IT. Most future AI incidents won’t come fr…
Guest: Mirko Peters
How to Detect Impossible Travel and Token Replay in Entra ID
Dec. 19, 2025

How to Detect Impossible Travel and Token Replay in Entra ID

This episode plays out like a cybercrime thriller, exposing how today’s most dangerous breaches don’t smash doors—they’re invited inside. The investigation opens with a single click on January 12th. A polished phishing email doesn’t steal a password; it steals a session token. Within minutes, that …
Guest: Mirko Peters
How to Stop AI Agents from Breaking Your M365 Environment
Dec. 18, 2025

How to Stop AI Agents from Breaking Your M365 Environment

What if your AI systems aren’t rebelling — they’re simply executing the chaos you built?In this episode, we break down a hard truth about AI agents, Microsoft Copilot, Power Automate, and enterprise automation: failures don’t come from intelligence gone rogue, they come from human inconsistency…
Guest: Mirko Peters
How AI Agents Are Creating Shadow IT in Microsoft 365
Dec. 15, 2025

How AI Agents Are Creating Shadow IT in Microsoft 365

Shadow IT didn’t disappear, it evolved into AI agents quietly moving your data faster than your controls can see.In this episode, we break down how AI agents, Copilot Studio bots, and Power Automate flows are becoming the new Shadow IT inside Microsoft 365. What starts as productivity quickly t…
Guest: Mirko Peters
How to Fix Document Chaos in Microsoft 365 With Purview
Dec. 11, 2025

How to Fix Document Chaos in Microsoft 365 With Purview

In a recent podcast, Mirko Peters discussed the critical importance of effective document management and compliance in organizations, emphasizing that lost documents can lead to organizational failure. He presented strategies for building an audit-ready Enterprise Content Management (ECM) system in…
Guest: Mirko Peters
How to Use Azure Automation to Clean Up Your Intune Estate
Dec. 7, 2025

How to Use Azure Automation to Clean Up Your Intune Estate

Stop patching ghosts and start running a self-healing workplace. This Podcast reveals why Microsoft Intune alone can’t scale your endpoint management – and how pairing Intune with Azure, Automation, Functions, Microsoft Graph, managed identities and Log Analytics turns chaos into a quiet, secure es…
Guest: Mirko Peters
Your Zero Trust Fails If Intune Devices Aren’t Truly Compliant
Dec. 5, 2025

Your Zero Trust Fails If Intune Devices Aren’t Truly Compliant

Microsoft Intune is a powerful endpoint management solution — but improper deployment can introduce serious security risks. Misconfigured policies, over-permissioned roles, and weak compliance settings often create hidden vulnerabilities that attackers can exploit.In this guide, we break down t…
Guest: Mirko Peters
How to Turn Microsoft Threat Analytics Into Real Security
Dec. 4, 2025

How to Turn Microsoft Threat Analytics Into Real Security

You’re letting attackers stroll through your Microsoft tenant because you treat Threat Analytics like a newsletter instead of a weapon. In this episode, we show security leaders and SOC analysts how to turn Microsoft Threat Analytics into a living playbook that actually reduces time to detect and c…
Guest: Mirko Peters
The M365 Audit Log Mistakes That Let Attackers Walk Right In
Dec. 4, 2025

The M365 Audit Log Mistakes That Let Attackers Walk Right In

What if your Zero Trust stack is silently greenlighting a perfect data heist in Microsoft 365?In this episode, we dissect how one “compliant” account quietly pulled 12,000 SharePoint files in 20 minutes—no malware, no DLP alerts, and all your Entra ID and conditional access policies saying “allow…
Guest: Mirko Peters
Teams Phishing Inside Your Tenant: How Attackers Trick Your Users
Dec. 3, 2025

Teams Phishing Inside Your Tenant: How Attackers Trick Your Users

Your Microsoft 365 tenant might already be compromised—and your MFA is effectively useless because of one misconfiguration you’ve probably left on.In this episode, the Office of Corrective Doctrine walks you through five brutal real-world attack paths inside Microsoft 365 and Entra ID: Teams ph…
Guest: Mirko Peters
Hybrid Security Is Broken: Why You Need Defender XDR Now
Dec. 2, 2025

Hybrid Security Is Broken: Why You Need Defender XDR Now

Stop Buying Security Tools: The Shocking ROI of One XDR TimelineDrowning in alerts across M365, endpoints, and cloud apps? This video shows why your hybrid security stack is a Rube Goldberg machine that screams and still misses real attacks. You’ll see the four blind spots in Microsoft 365, ide…
Guest: Mirko Peters
How to Use Entra and Sentinel to Catch M365 Attackers in Real Time
Dec. 2, 2025

How to Use Entra and Sentinel to Catch M365 Attackers in Real Time

MFA is not your shield – it’s already broken. In this episode, we walk the bridge of a real M365 tenant breach, step-by-step, from the attacker’s cockpit to your shattered inbox. You’ll hear how one phishing click plus an AitM proxy and a “benign” OAuth app stole live cookies, hijacked mailboxes, a…
Guest: Mirko Peters
Fix Conditional Access Loopholes Hackers Use in Microsoft 365
Nov. 30, 2025

Fix Conditional Access Loopholes Hackers Use in Microsoft 365

This episode explains how to “calm down” a messy Conditional Access setup by removing blind spots and setting clear boundaries. It walks through three main trust problems—overbroad exclusions, unclear device compliance, and token theft—and shows how to replace permanent exceptions with time-bound a…
Guest: Mirko Peters
Too Many False Positives in Defender? Fix It With Synthetic Analysts
Nov. 10, 2025

Too Many False Positives in Defender? Fix It With Synthetic Analysts

Your “intern” just became your scariest, smartest coworker—and it’s made of code.In this episode, we unpack how Microsoft Security Copilot is quietly turning traditional Security Operations Centers into AI-driven defense factories. Forget drowning in alerts, phishing noise, and endless Patch Tu…
Guest: Mirko Peters
our Copilot Setup Is Breaking GDPR: Fix These 5 Settings Now
Nov. 2, 2025

our Copilot Setup Is Breaking GDPR: Fix These 5 Settings Now

Copilot Notebooks feel magical — a conversational workspace that pulls context from SharePoint, OneDrive, Teams, decks, sheets, emails — and synthesizes answers instantly.But the moment users trust that illusion, they generate data that has no parents.Every Copilot output — a summary, parag…
Guest: Mirko Peters
Dataverse Role Mistakes That Let Partners Download Your Customer List
Oct. 20, 2025

Dataverse Role Mistakes That Let Partners Download Your Customer List

Your Power App didn’t get “hacked”—it was over-permitted. Treating Dataverse like SharePoint (big buckets, broad roles) turns guest access into a data breach waiting to happen. Dataverse is a relational fortress built on granular privileges (Create/Read/Write/Delete/Append/Append To/Assign/Share), …
Guest: Mirko Peters
Manual GRC in Microsoft 365 Is Broken – Build This Agent Instead
Oct. 19, 2025

Manual GRC in Microsoft 365 Is Broken – Build This Agent Instead

Manual GRC reporting burns time and budget: exporting Purview logs to Excel, reconciling pivots, and hoping nothing changed overnight. Replace that drag with an autonomous GRC agent built entirely on Microsoft 365: Purview for audit truth, Power Automate for scheduled extraction + classification, a…
Guest: Mirko Peters
Your Copilot Agent Uses Your Token – Lock Down Those Permissions Now
Oct. 19, 2025

Your Copilot Agent Uses Your Token – Lock Down Those Permissions Now

Copilot Studio agents don’t have their own ethics—or identities. By default they borrow the caller’s token, so any SharePoint, Outlook, Dataverse, or custom API you can see, your bot can see—and say. That’s how “innocent” answers leak context: connectors combine, chat telemetry persists, and analyt…
Guest: Mirko Peters