Got ideas about Microsoft 365? Want your own episode? → come build this with me on LinkedIn

Microsoft Security Podcast – Identity, Cloud & Enterprise Protection Episodes

Security within the Microsoft ecosystem is deeply integrated across identity, endpoints, cloud services, and data platforms. Security Talk focuses on understanding Microsoft security architecture as an interconnected system rather than isolated tools and dashboards.

In this category, we examine identity security using Entra ID, Conditional Access, and privileged access models, alongside Microsoft Defender, Purview, and security controls across Microsoft 365 and Azure. Episodes explore how attackers exploit misconfigurations, how security signals propagate across services, and why many security incidents stem from architectural assumptions rather than missing features.

Security Talk emphasizes why breaches happen, not just how to configure protection. We discuss threat models, attack paths, lateral movement, and the operational trade-offs between security, usability, and automation. Particular focus is given to identity-centric security, which has become the primary control plane for modern Microsoft environments.

This category is intended for security professionals, architects, and IT decision-makers who need to understand Microsoft security beyond checklists and best-practice documents. If you are responsible for protecting identities, data, and cloud workloads within Microsoft platforms, Security Talk provides clear, experience-based insight into building and maintaining resilient security architectures.
Governed AI: Keeping Copilot Secure and Compliant
Aug. 16, 2025

Governed AI: Keeping Copilot Secure and Compliant

Copilot can overreach if Graph permissions are too broad. One mis-scoped app permission lets AI surface files, spreadsheets, and confidential client data users couldn’t normally access. Fix it by treating Copilot like any high-privilege app: lock Graph scopes to least privilege, segment access with…
Zero Trust by Design in Microsoft 365 & Dynamics 365
Aug. 15, 2025

Zero Trust by Design in Microsoft 365 & Dynamics 365

MFA isn’t Zero Trust. If Microsoft 365 and Dynamics 365 don’t enforce the same identity, device, and session checks, attackers walk through the side door. “Zero Trust by Design” treats M365 + D365 as one system: align Conditional Access and risk signals, apply just-in-time roles, segment identities…
Graph API Permissions & Consent Models Explained
Aug. 11, 2025

Graph API Permissions & Consent Models Explained

Most Graph-powered apps fail at rollout not because of code, but consent. Dev tenants allow broad testing; production enforces tight policies that block risky scopes. The fix is understanding Graph’s two models—delegated (user-in-context) vs. application (app-only, org-wide)—and requesting the mini…
Data Loss Prevention (DLP) Policies for Power Platform Developers
Aug. 11, 2025

Data Loss Prevention (DLP) Policies for Power Platform Developers

Power Platform Data Loss Prevention (DLP) policies don’t have to be mystery roadblocks. In this episode, we explain why Flows fail with cryptic DLP errors and show exactly how to prevent them—before production. You’ll learn how connector classifications (business, non-business, blocked), custom con…
Securing Data Pipelines in Microsoft Fabric
Aug. 10, 2025

Securing Data Pipelines in Microsoft Fabric

Microsoft Fabric pipelines often feel “secure by default,” but silent data exposure usually comes from misconfigured permissions, hardcoded secrets, and overbroad workspace roles. This episode shows how to harden end-to-end pipelines with managed identities (kill passwords), Azure Key Vault (centra…
Deploying Dynamics 365 Customizations with ALM Pipelines
Aug. 10, 2025

Deploying Dynamics 365 Customizations with ALM Pipelines

Dynamics 365 deployments fail less because of code and more because of packaging gaps: hidden dependencies, unmanaged/managed mix-ups, missing environment variables and connection references, and un-migrated configuration data. In this episode, we show how to ship reliably by mapping dependencies u…
Data Loss Prevention Policies for Fabric and Power Platform
Aug. 6, 2025

Data Loss Prevention Policies for Fabric and Power Platform

This episode exposes the hidden gaps in Fabric and Power Platform Data Loss Prevention (DLP)—from shadow connectors and cross-environment leaks to misclassified “business” connectors that quietly exfiltrate sensitive data. You’ll learn how DLP decisions are really made (the if-then logic behind pol…
Setting Up ALM for Power Platform with GitHub Actions
Aug. 6, 2025

Setting Up ALM for Power Platform with GitHub Actions

This episode demystifies Power Platform ALM with GitHub Actions so you can see—and control—every step from source to prod. Learn why deployments fail (connector references, environment variables, and human-led imports), how to wire service principals and scoped secrets, and how to structure GitHub …
Your Phishing Reports Aren’t Showing the Whole Story
Aug. 3, 2025

Your Phishing Reports Aren’t Showing the Whole Story

Your phishing dashboard is lying to you. The “all good” charts hide near-miss clicks, silent investigations, and active campaigns threading your inboxes right now. We show how to tap Microsoft Defender’s buried signals and build living Power BI dashboards that expose what’s really happening—and wha…
Your SIEM Is Missing Critical M365 Logs
Aug. 2, 2025

Your SIEM Is Missing Critical M365 Logs

Your SIEM isn’t blind—it’s blinking. Out-of-the-box connectors skip crucial M365 logs (mailbox forwarding, granular SharePoint sharing, Teams/Power Platform actions), so the “all good” green light is faking you out. Turn your SIEM from checkbox to chokehold: ingest the right audit streams, filter n…
Defender for M365 Isn't What You Think
Aug. 1, 2025

Defender for M365 Isn't What You Think

Your users still click phish—even with Defender for M365 “fully enabled.” The culprit isn’t the attackers; it’s misaligned layers: Safe Links, Safe Attachments, anti-phishing ML, and mail flow rules that overlap, conflict, or leave gaps. This guide traces how a real phishing email slips through, th…
Automated Licensing: Fix The Invisible Failures
July 31, 2025

Automated Licensing: Fix The Invisible Failures

Your M365 Licenses Didn’t “Disappear”—Your Dynamic Groups Did (Here’s How to Stop the Silent Failures)If your automated license assignments randomly vanish—or premium SKUs linger on the wrong users—the culprit isn’t Microsoft. It’s brittle dynamic group rules, drifting attributes, and slow reca…
Nobody Explains Microsoft Graph Consent—Here’s What’s Missing
July 30, 2025

Nobody Explains Microsoft Graph Consent—Here’s What’s Missing

Stop blindly clicking “Grant admin consent.” This deep dive demystifies Microsoft Graph app-only permissions—who consents, which scopes you actually need, and how tokens really work in production. Learn least-privilege setups, admin consent gotchas, secret/cert rotation, managed identity, and audit…
Conditional Access vs Identity: Who Actually Decides?
July 30, 2025

Conditional Access vs Identity: Who Actually Decides?

Your best Microsoft 365 security signal isn’t the login—it’s what the identity does next. Wire Conditional Access (the gatekeeper) to listen to Defender for Identity (the watcher), and you’ll auto-raise friction when behavior turns risky—shrinking dwell time, false positives, and your midnight page…
Unlocking the REAL Power of DLP: 3 Insider Moves
July 30, 2025

Unlocking the REAL Power of DLP: 3 Insider Moves

Think your DLP rules have your Microsoft Power Platform locked down? Think again. The biggest data leak in your tenant may be hiding in plain sight—the default environment. In this episode, we expose why environment strategy—not just connector blocking—is the silent weak link behind surprising Powe…
Authentication Nightmares: How SPFx Really Handles Multi-Tenancy
July 30, 2025

Authentication Nightmares: How SPFx Really Handles Multi-Tenancy

Shipping a SharePoint Framework app to another tenant and watching auth blow up, Graph return nothing, and users not even see the web part? You’re not cursed—multi-tenant SPFx is. In this episode, I show the exact authentication traps that tank cross-tenant deployments, why Graph goes “empty,” and …
Intune: Zero-Touch Deployments Aren’t One-Size-Fits-All
July 29, 2025

Intune: Zero-Touch Deployments Aren’t One-Size-Fits-All

“Zero-touch” isn’t one-size-fits-all—it’s one-size-fails-fast. 🚨 The same Intune baseline that delights desk workers can break field techs, hobble engineers, and leave exec devices under- or over-secured. In this episode, I show you how to ditch blunt templates and turn Intune into a precision tool…
Microsoft Defender for Cloud
June 18, 2025

Microsoft Defender for Cloud

I use Microsoft Defender for Cloud because it gives me one place to manage security across Azure, AWS, and Google Cloud . Every week, I see thousands of threats, from ransomware to phishing and cloud misconfigurations. Ransom...
How Teams Governance Drives Collaboration and Success
May 19, 2025

How Teams Governance Drives Collaboration and Success

Imagine a workplace where every team operates in harmony, trust flourishes, and productivity soars. Teams governance holds the hidden power to make this vision a reality. It creates order by defining clear structures and role...
Power Without Paranoia: Unraveling Security and Innovation on Microsoft’s Power Platform
May 9, 2025

Power Without Paranoia: Unraveling Security and Innovation on Microsoft’s Power Platform

Everyone remembers that one time they broke something at work—maybe you were given a bit too much access, clicked the wrong button, and messed up that important report (guilty as charged!). The world of Microsoft’s Power Plat...
SC-900 Exam Prep Part 3/8: Microsoft Entra Roles EXPLAINED
May 8, 2025

SC-900 Exam Prep Part 3/8: Microsoft Entra Roles EXPLAINED

I once let my cousin borrow my car, only to realize I’d left the keys to my house on the keychain. Spoiler: Nothing bad happened, but it kept me up that night thinking, "Did I just give away too much trust by accident?" If yo...
SC-900 Exam Prep Part 2/8: Unlock Microsoft Entra ID’s Secrets
May 7, 2025

SC-900 Exam Prep Part 2/8: Unlock Microsoft Entra ID’s Secrets

When I first stepped into the world of IT, my role as an admin managing Active Directory dealt mostly with on-premise systems. As the industry evolved and Microsoft introduced its cloud solutions, I felt like I was back in sc...
SC-900 Exam Prep Part 1/8: The Cyber Security Fundamentals
May 6, 2025

SC-900 Exam Prep Part 1/8: The Cyber Security Fundamentals

When I first started navigating the world of IT security, I had an overwhelming sense of confusion. With the rise of cloud services and the shift to remote work, figuring out how to protect data felt like solving a puzzle wit...
How Security Copilot is Changing SOC Operations
April 24, 2025

How Security Copilot is Changing SOC Operations

In a recent podcast, security analyst Mirko Peters discussed the challenges faced by security teams due to the overwhelming volume of alerts and the fragmented nature of cybersecurity tools. He highlighted that analysts often deal with over 200 alerts daily, which complicates their ability to respo…