This episode performs an “autopsy” on why classical optimization collapses on NP-hard problems and how hybrid quantum methods, especially QAOA on Azure, can triage them. It explains qubits, superposition, entanglement, and interference as tools for exploring many “maybes” at once, while a classical…
Still writing PowerShell against MSOnline and AzureAD modules in 2025? This episode explains why that stack is legacy – and how to go API-first with pure REST and Microsoft Graph. We walk through the core “token, headers, REST call” pattern, three real-world auth flows (device code, client credenti…
Tired of chatbots that answer Intune incidents with poetry instead of fixes? In this episode, we go hands-on with Azure AI Foundry and Semantic Kernel to build a mini, self-healing, governed multi-agent system for enterprise IT. You’ll learn why single agents stall on real Intune, Entra ID, and Mic…
Stop patching ghosts and start running a self-healing workplace. This Podcast reveals why Microsoft Intune alone can’t scale your endpoint management – and how pairing Intune with Azure, Automation, Functions, Microsoft Graph, managed identities and Log Analytics turns chaos into a quiet, secure es…
Think your Azure backups are safe by default? They’re not. In this episode, we uncover how a single over-privileged identity can quietly kill “immutable” backups in Azure. You’ll hear real-life attack paths using compromised automation, shadow admins, and broad Contributor or Owner roles that delet…
Your data platform isn’t a platform – it’s a staged illusion. In this episode, I break down why your “modern stack” of Power BI, ad hoc pipelines, shadow CSVs and seven conflicting dashboards is really entropy in disguise. We dissect the real reason Microsoft Fabric exists: not as another feature b…
You’re wasting AI on small talk. In this session I show you how to turn chatty models into hardened IT ops agents that actually fix incidents while you sleep. We wire Semantic Kernel, MCP, Microsoft Graph and Azure OpenAI with managed identity so agents can plan, act and auto-verify – without handi…
The night is thick with static inside your tenant, and the questions aren’t small anymore. Copilot can walk the clean, well-lit M365 streets — summarizing inbox noise, tightening your notes, finding what you already have permission to see. Fast, friendly, useful. But tone isn’t truth, and guesses d…
STOP leaving your Intune tenant one misclick away from a breach. In this video, we hunt down the five most dangerous Microsoft Intune misconfigurations quietly exposing your Zero Trust ecosystem: weak conditional access, missing security baselines, standing admin rights, unmanaged BYOD, and reckles…
You’re letting attackers stroll through your Microsoft tenant because you treat Threat Analytics like a newsletter instead of a weapon. In this episode, we show security leaders and SOC analysts how to turn Microsoft Threat Analytics into a living playbook that actually reduces time to detect and c…
What if your Zero Trust stack is silently greenlighting a perfect data heist in Microsoft 365?
In this episode, we dissect how one “compliant” account quietly pulled 12,000 SharePoint files in 20 minutes—no malware, no DLP alerts, and all your Entra ID and conditional access policies saying “allow…
Your Microsoft 365 tenant might already be compromised—and your MFA is effectively useless because of one misconfiguration you’ve probably left on.
In this episode, the Office of Corrective Doctrine walks you through five brutal real-world attack paths inside Microsoft 365 and Entra ID: Teams ph…
Your “private” Microsoft Teams channels are quietly bleeding data – and default settings are to blame.
In this episode, we walk through real-world incidents where dormant guest accounts, synced libraries, and careless PII pastes turned Teams into a silent leak. You’ll see how to harden Microsoft…
Stop Buying Security Tools: The Shocking ROI of One XDR Timeline
Drowning in alerts across M365, endpoints, and cloud apps? This video shows why your hybrid security stack is a Rube Goldberg machine that screams and still misses real attacks. You’ll see the four blind spots in Microsoft 365, ide…
MFA is not your shield – it’s already broken. In this episode, we walk the bridge of a real M365 tenant breach, step-by-step, from the attacker’s cockpit to your shattered inbox. You’ll hear how one phishing click plus an AitM proxy and a “benign” OAuth app stole live cookies, hijacked mailboxes, a…
The podcast explains how attackers bypass MFA by abusing OAuth consent instead of stealing passwords. When a user or admin approves a malicious “productivity” app, it gets tokens with scopes like mail or files read and offline_access. That lets the attacker quietly read email, files and chats for m…
Are your dashboards secretly preaching lies? In this episode, we turn data governance into a full-on revival meeting. We name the heresy of ad-hoc share links, stale workspaces and broken RLS that quietly corrupt your “single source of truth”. Then we reveal the doctrine of distribution: org apps a…
Your “Simple” Excel App Is Quietly Wrecking Your Business (And You Won’t See It Until It’s Expensive)
Stop wiring Power Apps into spreadsheets and calling it “production.” Every shared Excel file is a glass elevator: silent data loss, last-save-wins concurrency, and zero governance until an audi…
This episode explains how to “calm down” a messy Conditional Access setup by removing blind spots and setting clear boundaries. It walks through three main trust problems—overbroad exclusions, unclear device compliance, and token theft—and shows how to replace permanent exceptions with time-bound a…
AI agents are shipping faster than your change control, and they’re carrying master keys to your data. This talk rips into how LangChain4J and Copilot Studio quietly turn “helpful copilots” into data-leaking, over-permissioned shadow admins with no audit trail. You’ll see exactly how prompt injecti…
In this episode of The M365 Show we investigate a familiar but often misunderstood failure pattern in enterprise AI: GPU costs rise, throughput collapses and latency becomes unpredictable, even though the dashboards look healthy and the models appear to work. Instead of blaming parameters or archit…
Stop burning cycles on manual Java upgrades. In this episode, we walk through a real-world, end-to-end modernization of a legacy Java 8 Spring app to Java 21, and show how AI agents quietly do the work your team keeps postponing—with receipts.
You’ll hear how we go from a drifting Java 8-era Spr…
Tired of “smart” AI agents doing dumb, dangerous things in your Microsoft 365 tenant? This episode shows you the one architectural move that turns flaky prompt-powered agents into reliable, auditable systems: a pre-execution contract check that blocks bad behavior before it ever hits your data. We …
Your copilot isn’t dumb, you’ve just been starving it of context and then blaming “hallucinations” for your own chaos. This talk basically says: the real reason Power Platform AI and Copilot Studio builds fail isn’t model IQ, it’s that you shipped an agent with no spine—no clear system message, no …