
FUD and Passkeys
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam delve into the concept of FUD (Fear, Uncertainty, and Doubt) prevalent in the cybersecurity industry. They discuss the implications of sensationalized reporting, particularly around Windows Hello for Business vulnerabilities and the importance of adopting fish resistant multi-factor authentication (MFA). The conversation also covers the security of passkeys, the risks of social engineering, and the need for critical consumption of cybersecurity news to avoid misinformation.----------------------------------------------------YouTube Video Link: https://youtu.be/IauO5oA2BA0----------------------------------------------------Documentation:https://cybersecuritynews.com/windows-hello-for-business-flaw/https://arstechnica.com/security/2025/08/new-research-claiming-passkeys-can-be-stolen-is-pure-nonsense/https://www.inc.com/jason-aten/why-google-is-warning-2-5-billion-gmail-users-to-stop-using-their-password/91234290----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: andy@bluesecuritypod.com----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: adam@bluesecuritypod.com
9 Sep 41min

Microsoft Licensing Overview - Part 3 - Niche Situations and Azure
SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the complexities of Microsoft licensing, focusing on device-based versus user-based licensing, the nuances of shared mailboxes, and the implications of mixing E3 and E5 licenses. They also explore Azure billing models and the costs associated with Security Copilot, providing insights into how organizations can manage their licensing effectively and economically.----------------------------------------------------YouTube Video Link: https://youtu.be/S54uqVMH44A----------------------------------------------------Documentation:https://www.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365-apps-for-enterprise-product?activetab=pivot:overviewtabhttps://azure.microsoft.com/en-us/pricing/calculator/https://youtu.be/-jG2BFPS45o?si=2BFEOt5J4ZwDtAmf----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: andy@bluesecuritypod.com----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: adam@bluesecuritypod.com
2 Sep 48min

Microsoft Licensing Overview - Part 2
SummaryThe hosts, Andy and Adam, delve into the nuances of licensing models, particularly focusing on the differences between frontline and information worker licenses. They explore the F1, F3, and F5 licensing models, highlighting key differences such as access to desktop applications and mailbox sizes. The episode also covers the integration of AI tools like M365 Copilot and Security Copilot, and discusses various Microsoft suites like Intune and Entra, emphasizing their components and benefits. The conversation aims to clarify the often confusing landscape of Microsoft licensing for security solutions.----------------------------------------------------YouTube Video Link: https://youtu.be/k-Qy4XjQDqw----------------------------------------------------Documentation:https://m365maps.com/----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: andy@bluesecuritypod.com----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: adam@bluesecuritypod.com
26 Aug 37min

Microsoft Security Licensing Part 1
SummaryHosts Andy and Adam discuss the structure of enterprise agreements, the differences between Office 365 and Microsoft 365, and the transition from consumer-focused to enterprise-focused offerings. They explain the historical context of Microsoft's licensing evolution, the role of enterprise agreements, and the introduction of the Microsoft Customer Agreement for Enterprise (MCAE). The episode aims to demystify the licensing process, highlighting the importance of understanding what is included in various bundles and the benefits of moving to enterprise agreements for better pricing and comprehensive solutions.----------------------------------------------------YouTube Video Link: https://youtu.be/k-Qy4XjQDqw----------------------------------------------------Documentation:https://m365maps.com/----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: andy@bluesecuritypod.com----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: adam@bluesecuritypod.com
19 Aug 1h 2min

Palo Alto acquires Cyberark, Sentinel News, MDTI is going to be FREE!
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant developments in the cybersecurity landscape, including Palo Alto's acquisition of CyberArk, the introduction of Microsoft Sentinel's Data Lake feature, and the integration of Defender Threat Intelligence into existing Microsoft security solutions. They emphasize the importance of a platform approach to cybersecurity and the challenges associated with acquisitions in the industry.----------------------------------------------------YouTube Video Link: https://youtu.be/8BRxQUyHNh4----------------------------------------------------Documentation:https://www.paloaltonetworks.com/company/press/2025/palo-alto-networks-announces-agreement-to-acquire-cyberark--the-identity-security-leaderhttps://techcommunity.microsoft.com/blog/microsoft-security-blog/introducing-microsoft-sentinel-data-lake/4434280https://techcommunity.microsoft.com/blog/defenderthreatintelligence/mdti-is-converging-into-microsoft-sentinel-and-defender-xdr/4427991----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: andy@bluesecuritypod.com----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: adam@bluesecuritypod.com
5 Aug 33min

SharePoint Server, Help Desk Security, Terminating IT Admins
SummaryIn this episode, Adam Brewer and Andy Jaw discuss recent SharePoint vulnerabilities, the importance of data protection and governance, and the implications of the Clorox cyber attack. They explore the challenges of managing insider threats in IT, emphasizing the need for robust security measures and proactive communication with customers. The conversation highlights the critical nature of cybersecurity in today's digital landscape and the responsibilities of organizations to protect their data and systems.----------------------------------------------------YouTube Video Link: https://youtu.be/gH8jS0mai2U----------------------------------------------------Documentation:https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/?msockid=247fdde1b8b2631d1f8bc80db91a6238https://arstechnica.com/security/2025/07/how-do-hackers-get-passwords-sometimes-they-just-ask/https://flaglerlive.com/it-attack-firing/----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: andy@bluesecuritypod.com----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: adam@bluesecuritypod.com
29 Juli 52min

Power grid vulnerabilities, To Catch a Thief, AI Bug Hunter
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the vulnerabilities in solar technology, particularly focusing on smart inverters and their implications for power grids. They delve into the cybersecurity landscape, emphasizing China's role in technology transfer and its impact on national security. The conversation shifts to the potential of AI in cybersecurity, highlighting its ability to discover vulnerabilities and anomalies, and how it can enhance security operations. The episode concludes with a positive outlook on the integration of AI in cybersecurity practices.----------------------------------------------------YouTube Video Link: https://youtu.be/u3TfSpw10Qc----------------------------------------------------Documentation:https://www.newscientist.com/article/2487089-cyberattacks-could-exploit-home-solar-panels-to-disrupt-power-grids/https://open.spotify.com/show/1xFnf1ReS81p79TtR7f6vj?si=4d4ea5acc39c4bcehttps://www.pcmag.com/news/this-ai-is-outranking-humans-as-a-top-software-bug-hunter----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: andy@bluesecuritypod.com----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: adam@bluesecuritypod.com
22 Juli 43min





















