Follow me on LinkedIn for daily Microsoft 365 insights

Security Talk Episodes

Security Talk is where we deal with the uncomfortable but necessary reality that the modern threat landscape is no longer “patching and antivirus” — it is identity-centric, cloud-first, constantly evolving, and deeply business-impacting.
This is Microsoft Defender, Sentinel, Entra ID, Purview risk and compliance capabilities, Zero Trust patterns, SIEM + XDR fusion, identity protection, conditional access strategy, and the practical translation of security controls into operational, measurable outcomes.

The discussion is not tool-demo driven — it is threat-driven.
We talk about how to actually design and maintain a defensible Microsoft security posture in environments that are hybrid, mobile, multi-tenant, and constantly changing. We unpack what Secure Score actually means in real life, how to interpret signals instead of chasing alerts, why identity hygiene matters more than firewall rules, how to navigate user friction vs control, and how to build security approaches that support the business instead of blocking it.

Security Talk is about translating Microsoft’s security stack into patterns that reduce blast radius, enable fast detection, accelerate response, withstand breaches, and help security teams work as a strategic partner rather than a reactive helpdesk. It is focused on real attack path reduction, not checkbox compliance.

If it hardens identity, protects data, strengthens posture, or allows defenders to respond faster and smarter — it lives in Security Talk.
Aug. 6, 2025

Setting Up ALM for Power Platform with GitHub Actions

This episode demystifies Power Platform ALM with GitHub Actions so you can see—and control—every step from source to prod. Learn why deployments fail (connector references, environment variables, and human-led imports), how to wire service principals and scoped secrets, and how to structure GitHub …
Aug. 3, 2025

Your Phishing Reports Aren’t Showing the Whole Story

Your phishing dashboard is lying to you. The “all good” charts hide near-miss clicks, silent investigations, and active campaigns threading your inboxes right now. We show how to tap Microsoft Defender’s buried signals and build living Power BI dashboards that expose what’s really happening—and wha…
Aug. 2, 2025

Your SIEM Is Missing Critical M365 Logs

Your SIEM isn’t blind—it’s blinking. Out-of-the-box connectors skip crucial M365 logs (mailbox forwarding, granular SharePoint sharing, Teams/Power Platform actions), so the “all good” green light is faking you out. Turn your SIEM from checkbox to chokehold: ingest the right audit streams, filter n…
Aug. 1, 2025

Defender for M365 Isn't What You Think

Your users still click phish—even with Defender for M365 “fully enabled.” The culprit isn’t the attackers; it’s misaligned layers: Safe Links, Safe Attachments, anti-phishing ML, and mail flow rules that overlap, conflict, or leave gaps. This guide traces how a real phishing email slips through, th…
July 31, 2025

Automated Licensing: Fix The Invisible Failures

Your M365 Licenses Didn’t “Disappear”—Your Dynamic Groups Did (Here’s How to Stop the Silent Failures) If your automated license assignments randomly vanish—or premium SKUs linger on the wrong users—the culprit isn’t Microsoft. It’s brittle dynamic group rules, drifting attributes, and slow reca…
July 30, 2025

Nobody Explains Microsoft Graph Consent—Here’s What’s Missing

Stop blindly clicking “Grant admin consent.” This deep dive demystifies Microsoft Graph app-only permissions—who consents, which scopes you actually need, and how tokens really work in production. Learn least-privilege setups, admin consent gotchas, secret/cert rotation, managed identity, and audit…
July 30, 2025

Conditional Access vs Identity: Who Actually Decides?

Your best Microsoft 365 security signal isn’t the login—it’s what the identity does next. Wire Conditional Access (the gatekeeper) to listen to Defender for Identity (the watcher), and you’ll auto-raise friction when behavior turns risky—shrinking dwell time, false positives, and your midnight page…
July 30, 2025

Unlocking the REAL Power of DLP: 3 Insider Moves

Think your DLP rules have your Microsoft Power Platform locked down? Think again. The biggest data leak in your tenant may be hiding in plain sight—the default environment. In this episode, we expose why environment strategy—not just connector blocking—is the silent weak link behind surprising Powe…
July 30, 2025

Authentication Nightmares: How SPFx Really Handles Multi-Tenancy

Shipping a SharePoint Framework app to another tenant and watching auth blow up, Graph return nothing, and users not even see the web part? You’re not cursed—multi-tenant SPFx is. In this episode, I show the exact authentication traps that tank cross-tenant deployments, why Graph goes “empty,” and …
July 29, 2025

Intune: Zero-Touch Deployments Aren’t One-Size-Fits-All

“Zero-touch” isn’t one-size-fits-all—it’s one-size-fails-fast. 🚨 The same Intune baseline that delights desk workers can break field techs, hobble engineers, and leave exec devices under- or over-secured. In this episode, I show you how to ditch blunt templates and turn Intune into a precision tool…
June 18, 2025

Microsoft Defender for Cloud

I use Microsoft Defender for Cloud because it gives me one place to manage security across Azure, AWS, and Google Cloud . Every week, I see thousands of threats, from ransomware to phishing and cloud misconfigurations. Ransom...
May 19, 2025

How Teams Governance Drives Collaboration and Success

Imagine a workplace where every team operates in harmony, trust flourishes, and productivity soars. Teams governance holds the hidden power to make this vision a reality. It creates order by defining clear structures and role...
May 9, 2025

Power Without Paranoia: Unraveling Security and Innovation on Microsoft’s Power Platform

Everyone remembers that one time they broke something at work—maybe you were given a bit too much access, clicked the wrong button, and messed up that important report (guilty as charged!). The world of Microsoft’s Power Plat...
May 8, 2025

SC-900 Exam Prep Part 3/8: Microsoft Entra Roles EXPLAINED

I once let my cousin borrow my car, only to realize I’d left the keys to my house on the keychain. Spoiler: Nothing bad happened, but it kept me up that night thinking, "Did I just give away too much trust by accident?" If yo...
May 7, 2025

SC-900 Exam Prep Part 2/8: Unlock Microsoft Entra ID’s Secrets

When I first stepped into the world of IT, my role as an admin managing Active Directory dealt mostly with on-premise systems. As the industry evolved and Microsoft introduced its cloud solutions, I felt like I was back in sc...
May 6, 2025

SC-900 Exam Prep Part 1/8: The Cyber Security Fundamentals

When I first started navigating the world of IT security, I had an overwhelming sense of confusion. With the rise of cloud services and the shift to remote work, figuring out how to protect data felt like solving a puzzle wit...
April 24, 2025

How Security Copilot is Changing SOC Operations

In a recent podcast, security analyst Mirko Peters discussed the challenges faced by security teams due to the overwhelming volume of alerts and the fragmented nature of cybersecurity tools. He highlighted that analysts often deal with over 200 alerts daily, which complicates their ability to respo…