Got ideas about Microsoft 365? Want your own episode? → come build this with me on LinkedIn

Microsoft Security Podcast – Identity, Cloud & Enterprise Protection Episodes

Security within the Microsoft ecosystem is deeply integrated across identity, endpoints, cloud services, and data platforms. Security Talk focuses on understanding Microsoft security architecture as an interconnected system rather than isolated tools and dashboards.

In this category, we examine identity security using Entra ID, Conditional Access, and privileged access models, alongside Microsoft Defender, Purview, and security controls across Microsoft 365 and Azure. Episodes explore how attackers exploit misconfigurations, how security signals propagate across services, and why many security incidents stem from architectural assumptions rather than missing features.

Security Talk emphasizes why breaches happen, not just how to configure protection. We discuss threat models, attack paths, lateral movement, and the operational trade-offs between security, usability, and automation. Particular focus is given to identity-centric security, which has become the primary control plane for modern Microsoft environments.

This category is intended for security professionals, architects, and IT decision-makers who need to understand Microsoft security beyond checklists and best-practice documents. If you are responsible for protecting identities, data, and cloud workloads within Microsoft platforms, Security Talk provides clear, experience-based insight into building and maintaining resilient security architectures.
Your Copilot Rollout Is Illegal Without DPA and Product Terms Check
Oct. 18, 2025

Your Copilot Rollout Is Illegal Without DPA and Product Terms Check

Turning on Microsoft Copilot isn’t magic—it’s governance in motion. That toggle activates a chain of contractual, technical, and organizational controls that either align…or explode. Contracts (Microsoft Product Terms + DPA) set the legal wiring: data residency, processor role, IP ownership, no tra…
Guest: Mirko Peters
Are Your Power Platform Apps Now “High‑Risk AI”? Fix This Before Audits
Oct. 15, 2025

Are Your Power Platform Apps Now “High‑Risk AI”? Fix This Before Audits

This episode is a practical walk-through of what actually goes wrong when organizations deploy copilots or chatbots without Responsible AI guardrails.It explains why:modern LLMs are non-deterministicprompt injection is not hypotheticalbad outputs can cascade across business workflows fast…
Guest: Mirko Peters
How Managers Can Control AI Agents So They Don’t Override Human Decisions
Oct. 10, 2025

How Managers Can Control AI Agents So They Don’t Override Human Decisions

AI agents are about to feel like real coworkers inside Teams—fast, tireless, and dangerously literal. This episode gives you a simple framework to keep them helpful and safe: manage their memory, entitlements, and tools, and layer prompting, verification, and human-in-the-loop oversight. You’ll lea…
Guest: Mirko Peters
Hard‑Coded SQL Logins in Azure? Replace Them Safely in One Weekend
Oct. 6, 2025

Hard‑Coded SQL Logins in Azure? Replace Them Safely in One Weekend

In this episode, we break down the essential steps for securing web applications on Microsoft Azure, focusing on Azure App Service and its built-in security capabilities. You’ll learn what Azure App Service is, why it’s a powerful platform-as-a-service (PaaS) option, and how it simplifies deploymen…
Guest: Mirko Peters
Copilot Data Leak Scare? Use Purview DSPM to See What Really Happened
Oct. 2, 2025

Copilot Data Leak Scare? Use Purview DSPM to See What Really Happened

AI isn’t an edge case in your SIEM anymore—it’s a participant. This episode asks a hard question: when Copilot surfaces a confidential file your user can technically access, is that a breach, a policy gap, or “works as designed”? We walk through why AI access alerts don’t fit classic kill-chain thi…
Guest: Mirko Peters
Autonomous Agents: Productivity Hack or Admin Nightmare?
Sept. 27, 2025

Autonomous Agents: Productivity Hack or Admin Nightmare?

The real shift is autonomous AI agents – systems that don’t just answer a prompt and wait for the next human nudge, but notice, decide, and act on their own. Not a “bot that replies in Teams,” but a worker that reads the situation, picks a plan, executes it, and learns from whatever broke along the…
Guest: Mirko Peters
Microsoft Purview Data Governance: The Info Architect’s Survival Guide
Sept. 19, 2025

Microsoft Purview Data Governance: The Info Architect’s Survival Guide

Microsoft Purview has quickly become one of the most important tools for modern data governance, and in this episode we break down exactly how its architecture works, why organizations rely on it, and how to put best practices in place to protect sensitive information across Microsoft 365, Azure, m…
Guest: Mirko Peters
Why ARM Templates Are Holding You Back
Sept. 13, 2025

Why ARM Templates Are Holding You Back

This episode breaks down the differences between Bicep and ARM templates to help Azure teams choose the best Infrastructure-as-Code approach. It starts with a quick refresher on ARM templates and why they’ve long been the standard, then introduces Bicep as a cleaner, simpler, more maintainable alte…
Guest: Mirko Peters
Passkeys vs Passwords: Why Microsoft 365 Is Going Passwordless
Sept. 11, 2025

Passkeys vs Passwords: Why Microsoft 365 Is Going Passwordless

This episode explains how organizations are moving away from passwords by using passwordless authentication with Microsoft Entra ID. It opens with eye-opening data on credential theft, then breaks down how FIDO2 security keys, Windows Hello, and the Microsoft Authenticator app work — in simple, cle…
Guest: Mirko Peters
The Hidden Risks in Your Cloud (That Most Teams Miss)
Sept. 10, 2025

The Hidden Risks in Your Cloud (That Most Teams Miss)

This episode exposes the most significant — and often hidden — cloud security risks in Microsoft 365 and Azure. It cuts through marketing claims with real attack examples, misconfiguration failures, and lessons learned from actual incident response timelines. Listeners hear how a single oversight l…
Guest: Mirko Peters
Microsoft Purview vs Rogue AI: How to Control AI Data Risks in Microsoft 365
Sept. 7, 2025

Microsoft Purview vs Rogue AI: How to Control AI Data Risks in Microsoft 365

This episode dives into the escalating tension between governed AI and the chaos that unfolds when AI systems operate without oversight. We explore how Microsoft Purview has become the backbone of responsible AI adoption, bringing structure, visibility, and control to data that AI agents depend on.…
Guest: Mirko Peters
Your Microsoft MIP Rollout Is Broken: Why Data Protection Fails in Microsoft 365
Sept. 7, 2025

Your Microsoft MIP Rollout Is Broken: Why Data Protection Fails in Microsoft 365

This episode takes you deep into the world of Microsoft Purview Information Protection and explains why it has become one of the most important pillars of modern data security. We walk through what information protection really means, why sensitive data is getting harder to control, and how Purview…
Guest: Mirko Peters
Microsoft Defender Alone vs Sentinel: Why Your Security Strategy Is Failing in Microsoft 365
Sept. 5, 2025

Microsoft Defender Alone vs Sentinel: Why Your Security Strategy Is Failing in Microsoft 365

This episode breaks down the confusion many organizations face when trying to understand the difference between Microsoft Defender and Microsoft Sentinel, two tools that sound similar but play very different roles in the Azure security landscape. We walk through how Defender focuses on real-time pr…
Guest: Mirko Peters
M365 Is Not Ready for KRITIS… Or Is It?
Sept. 4, 2025

M365 Is Not Ready for KRITIS… Or Is It?

This episode takes a critical look at whether Microsoft 365 is truly ready for KRITIS environments, the highly regulated sectors where security, reliability, and compliance aren’t just important but mandatory. We explore why so many organizations in critical infrastructure struggle with adopting M3…
Guest: Mirko Peters
This AI Sees Everything: The Hidden Data Risk Behind Microsoft 365 Copilot
Sept. 2, 2025

This AI Sees Everything: The Hidden Data Risk Behind Microsoft 365 Copilot

This episode dives into the growing role of Fabric Data Agents inside Microsoft Copilot Studio and how they’re reshaping the way organizations interact with their data. The hosts start by breaking down what a Fabric Data Agent actually is—an AI-driven intermediary that gives users controlled access…
Guest: Mirko Peters
Microsoft 365 Security Best Practices: Protect Your Tenant Without User Friction
Aug. 30, 2025

Microsoft 365 Security Best Practices: Protect Your Tenant Without User Friction

This episode dives deep into the foundations of Microsoft 365 security and why locking down your M365 tenant has never mattered more. The conversation opens with a look at what “Microsoft 365 security” truly means today: a constantly evolving mix of policies, controls, and intelligent protection la…
Guest: Mirko Peters
Microsoft 365 Guest Access Governance and User Management
Aug. 28, 2025

Microsoft 365 Guest Access Governance and User Management

Your Microsoft 365 tenant is probably full of “guests who never left.” Contractors, vendors, and partners get invited for short projects—and their accounts quietly live on for years. That sprawl creates hidden risk: lingering access to SharePoint and Teams, easy entry for attackers via compromised …
Guest: Mirko Peters
Microsoft 365 Security vs Usability: Why Zero Trust Alone Doesn’t Work
Aug. 22, 2025

Microsoft 365 Security vs Usability: Why Zero Trust Alone Doesn’t Work

“Zero Trust everywhere” and “freedom for everyone” both fail in production. One grinds work to a halt; the other invites disaster. In this workshop we show how top M365 orgs hit the operating sweet spot—where CISO, GDPR officer, and everyday users all win. You’ll learn how small portal changes casc…
Guest: Mirko Peters
Microsoft Entra Explained: Why It’s a Complete Identity & Access Management Platform
Aug. 21, 2025

Microsoft Entra Explained: Why It’s a Complete Identity & Access Management Platform

Active Directory was built for office networks that barely exist anymore. Today, identities — not networks — are the real perimeter. Microsoft Entra isn’t “AD in the cloud”; it’s a suite designed for a hybrid, perimeter-less world: Entra ID for auth and conditional access, Permissions Management fo…
Guest: Mirko Peters
How to Automate Compliance Tasks in Microsoft 365 with Power Automate
Aug. 21, 2025

How to Automate Compliance Tasks in Microsoft 365 with Power Automate

Compliance fails when it’s static. Checklists freeze rules in time, but regulations keep moving. In this episode, you’ll learn how to turn compliance from a brittle, manual checklist into a self-updating, feedback-driven system using Power Automate + SharePoint/Dataverse + Power BI.We cover recur…
Guest: Mirko Peters
Microsoft 365 DLP Setup Guide: Create and Configure Policies in Purview
Aug. 20, 2025

Microsoft 365 DLP Setup Guide: Create and Configure Policies in Purview

This episode examines the real return on Copilot by focusing on outcomes rather than features. It argues that the biggest cost in modern organizations isn’t failed projects or bad strategy, but the quiet drain of routine work—emails, meetings, drafts, reports, and administrative tasks that create t…
Guest: Mirko Peters
Microsoft Defender for Cloud Compliance Monitoring: Dashboards, Scores & Insights
Aug. 20, 2025

Microsoft Defender for Cloud Compliance Monitoring: Dashboards, Scores & Insights

Most teams “pass” audits yet miss real misconfigurations between reviews. Microsoft Defender for Cloud changes that by turning compliance into a live posture: map your estate to frameworks (ISO/NIST/PCI), tailor controls to your own standards, auto-remediate drift, and surface results in Power BI f…
Guest: Mirko Peters
Microsoft Purview vs Azure Information Protection: Key Differences, Features & Use Cases
Aug. 18, 2025

Microsoft Purview vs Azure Information Protection: Key Differences, Features & Use Cases

Think Purview and Azure Information Protection are “enterprise-only”? Think again. If you’re already on Microsoft 365 (E3 or Business Premium), you likely have sensitivity labels, baseline DLP, and email encryption ready to use—no extra spend. This episode debunks the biggest myth about data protec…
Guest: Mirko Peters
How to Audit User Activity with Microsoft Purview
Aug. 16, 2025

How to Audit User Activity with Microsoft Purview

Auditing user activity in Microsoft 365 is no longer optional — it’s essential for security, compliance, and governance. Microsoft Purview provides powerful audit capabilities, but many organizations don’t use them correctly or fail to leverage advanced logging features.In this guide, we walk t…