by Alan Armstrong & Sam Foot
Listen with Alan Armstrong and Sam Foot as we talk about all things Microsoft Azure! We are both technical consultants working with Azure day in, day out. Alan focuses on Identity and Security automation while Sam is a .NET developer deploying PaaS and SaaS solutions on Azure. Each episode we have a topic we cover and we highlight some key news that we are interested in. No fluff, sales or products here, just two technical people having a light hearted chat.
Language
🇺🇲
Publishing Since
5/19/2020
Email Addresses
1 available
Phone Numbers
0 available
April 11, 2025
Hosts Alan and Sam discuss the latest Microsoft Azure updates and new features released in March
March 28, 2025
<p>This episode Alan and Sam dive into the issues around OAuth apps and understanding how they are being used. Alan discusses the issues organisations are facing when any user could consent to application and the cleansing process that needs to take place. He also goes into how App Governance in Defender for Cloud Apps can help. Here are the areas they covered:</p> <ul> <li>What are OAuth Apps?</li> <li>What is Defender for Cloud Apps?</li> <li>How can Defender for Cloud Apps help review consented apps?</li> <li>What policies can you deploy?</li> </ul> <p>What did you think of this episode? Give us some feedback via our <a href="https://www.letstalkpodcast.co.uk/contact/" rel="nofollow">contact form</a>, Or leave us a voice message in the bottom right corner of our site.</p><p><a href="https://pnc.st/s/lets-talk-azure/ae58915e/monitor-your-oauth-apps-using-defender-for-cloud-apps/transcript">Read transcript</a></p><hr>
March 21, 2025
<p>In this episode, we dive into two great features of Microsoft Defender for Cloud: Security Explorer and Attack Paths. Join us as we unpack how these tools leverage the Cloud Security Graph to help you hunt down risks, map potential attack routes, and prioritize your cloud security efforts like never before. Whether you’re managing Azure, AWS, or a hybrid setup, this episode is packed with insights to level up your defense strategy.</p> <p>What You’ll Learn:</p> <ul> <li>How the Cloud Security Graph provides a unified view of your multicloud environment.</li> <li>Using Security Explorer to proactively identify vulnerabilities and misconfigurations with custom queries.</li> <li>Visualizing Attack Paths to see how attackers could move from an entry point to your critical assets.</li> <li>Practical tips for prioritizing fixes and boosting your Secure Score.</li> <li>Real-world examples of these tools in action and how to get started today.</li> </ul> <p>What did you think of this episode? Give us some feedback via our <a href="https://www.letstalkpodcast.co.uk/contact/" rel="nofollow">contact form</a>, Or leave us a voice message in the bottom right corner of our site.</p><p><a href="https://pnc.st/s/lets-talk-azure/2967b1ac/mapping-the-threatscape-security-explorer-attack-paths-in-microsoft-defender-for-cloud/transcript">Read transcript</a></p><hr>
Tobias Zimmergren, Jussi Roine
Massive Studios
Scott Hanselman
Amazon Web Services
David Spark, Steve Zalewski, Geoff Belknap
CISO Series
Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos
Jim Love
TWiT
Ben Stegink, Scott Hoag
David Spark, Mike Johnson, and Andy Ellis
N2K Networks
Software Engineering Daily
The Stack Overflow Podcast
Pod Engine is not affiliated with, endorsed by, or officially connected with any of the podcasts displayed on this platform. We operate independently as a podcast discovery and analytics service.
All podcast artwork, thumbnails, and content displayed on this page are the property of their respective owners and are protected by applicable copyright laws. This includes, but is not limited to, podcast cover art, episode artwork, show descriptions, episode titles, transcripts, audio snippets, and any other content originating from the podcast creators or their licensors.
We display this content under fair use principles and/or implied license for the purpose of podcast discovery, information, and commentary. We make no claim of ownership over any podcast content, artwork, or related materials shown on this platform. All trademarks, service marks, and trade names are the property of their respective owners.
While we strive to ensure all content usage is properly authorized, if you are a rights holder and believe your content is being used inappropriately or without proper authorization, please contact us immediately at [email protected] for prompt review and appropriate action, which may include content removal or proper attribution.
By accessing and using this platform, you acknowledge and agree to respect all applicable copyright laws and intellectual property rights of content owners. Any unauthorized reproduction, distribution, or commercial use of the content displayed on this platform is strictly prohibited.