『M365 Show Podcast』のカバーアート

M365 Show Podcast

M365 Show Podcast

著者: Mirko Peters
無料で聴く

このコンテンツについて

Welcome to the M365 Show — your essential podcast for everything Microsoft 365, Azure, and beyond. Join us as we explore the latest developments across Power BI, Power Platform, Microsoft Teams, Viva, Fabric, Purview, Security, and the entire Microsoft ecosystem. Each episode delivers expert insights, real-world use cases, best practices, and interviews with industry leaders to help you stay ahead in the fast-moving world of cloud, collaboration, and data innovation. Whether you're an IT professional, business leader, developer, or data enthusiast, the M365 Show brings the knowledge, trends, and strategies you need to thrive in the modern digital workplace. Tune in, level up, and make the most of everything Microsoft has to offer.



Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support.Copyright Mirko Peters / m365.Show
政治・政府
エピソード
  • Active Directory is a Black Hole: The Physics of Security Drift (Part 1)
    2025/12/21
    In this episode, we explore the hidden architecture that powers today’s digital world — from network edges and data fabrics to auditing, security, and infrastructure visibility. We break down how modern systems are built, monitored, and protected, and why transparency across complex networks is no longer optional. 🚀 What You’ll Learn in This Episode
    • What the “edge of the network” really means
    • How data is recorded, audited, and monitored in real time
    • Why visibility across systems is the backbone of modern cybersecurity
    • The role of automation and observability in preventing breaches
    • How organizations maintain trust, compliance, and performance at scale
    • The growing importance of resilient digital infrastructure
    🧠 Key Topics Covered
    • Network perimeter vs. cloud-based systems
    • Security logging and audit trails
    • Data integrity and system verification
    • Infrastructure monitoring
    • Compliance, governance, and risk
    • Scalability challenges in modern networks
    💬 Notable Themes “If you can’t see it, you can’t secure it.”
    This episode emphasizes that visibility is the foundation of security, reliability, and operational success. 👥 Who This Episode Is For
    • IT Professionals
    • Cybersecurity Analysts
    • Network Engineers
    • Startup Founders & CTOs
    • Anyone interested in how digital systems truly work


    Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support.

    Follow us on:
    LInkedIn
    Substack
    続きを読む 一部表示
    2 時間 16 分
  • SharePoint Is Broken: The AI Governance Fix
    2025/12/20
    Is SharePoint really broken in the age of artificial intelligence? Or is the real problem missing AI governance and data strategy? In this episode, I explain why traditional SharePoint architectures fail in modern AI-driven environments—and how a structured AI governance framework can fix data chaos, security risks, and compliance issues before they destroy trust in your systems. You’ll learn:
    • Why SharePoint breaks under AI workloads
    • How poor data governance blocks successful AI projects
    • What AI governance really means in practice
    • How organizations can regain control over:
      • Data quality
      • Security
      • Compliance
      • Access management
    • And how to prepare SharePoint for machine learning, Copilot, and enterprise AI
    🔍 Why This Matters Without clean, well-governed data, AI systems become unreliable, insecure, and legally risky. Many organizations attempt to scale AI on top of broken SharePoint structures—creating massive hidden risks. This episode shows exactly where things go wrong and how to fix them properly. 🛠 Practical Use Cases Covered
    • AI-powered document search in SharePoint
    • Microsoft Copilot readiness
    • Synthetic data vs. production data
    • Secure data pipelines for machine learning
    • Enterprise AI compliance strategies
    🎯 Who This Episode Is For
    • Data scientists
    • IT architects
    • Microsoft 365 & SharePoint admins
    • AI engineers
    • Security & compliance professionals
    • And anyone building data-driven systems


    Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support.

    Follow us on:
    LInkedIn
    Substack
    続きを読む 一部表示
    31 分
  • Cloud Crime Scene: The Microsoft Forensics
    2025/12/20
    What really happens inside a Security Operations Center when a cloud breach unfolds? In this gripping episode of Cloud Crime Scene: The Microsoft Forensics, we take you deep inside the digital investigation process as Microsoft security experts unravel a real-world style cloud incident. From silent alerts to hidden attacker movement, you’ll experience how modern cyber forensics works in the age of cloud computing. This episode blends technical insight, real incident response workflows, and digital crime storytelling to reveal how attackers exploit misconfigurations, identity gaps, and cloud drift—while defenders race against time to stop the breach. 🔍 What You’ll Learn in This Episode
    • How modern cloud attacks are detected inside a SOC
    • What cloud forensic investigations look like in real time
    • The dangers of configuration drift, security debt, and identity sprawl
    • How attackers pivot through Microsoft cloud environments
    • The role of telemetry, logs, and threat hunting in identifying intrusions
    • Why dashboards don’t always show the full story
    • How small security gaps lead to major cloud breaches
    🧠 Key Topics Covered
    • Cloud incident response
    • Microsoft security forensics
    • SOC operations and alert triage
    • Identity-based attacks
    • Cloud misconfigurations
    • Threat detection and investigation
    • Digital forensics in enterprise environments
    • Security drift and cloud risk
    🚨 Episode Summary The episode opens inside a tense Security Operations Center as the hum of machines fades and an unfamiliar alert cuts through the silence. What begins as routine monitoring quickly unfolds into a full-scale investigation. As analysts trace abnormal behavior across cloud workloads, they uncover a dangerous mix of identity compromise, configuration drift, and unmonitored activity. Through forensic analysis and real-time response, this episode shows how quickly attackers can move through cloud environments—and how difficult it is to contain them without proper visibility and controls. It’s a powerful reminder that cloud security isn’t just about tools—it’s about process, discipline, and continuous vigilance. 🎯 Who This Episode Is For
    • Cloud security professionals
    • SOC analysts & incident responders
    • Microsoft security practitioners
    • Digital forensics experts
    • IT security leaders
    • Students learning cybersecurity & cloud defense
    • Anyone interested in real-world cybercrime investigations
    🔐 Why This Episode Matters Cloud environments move fast—but attackers move faster. This episode shows exactly how breaches develop in modern Microsoft-based infrastructures and what security teams must do to stay ahead. If you’re responsible for securing workloads, identities, or data in the cloud, this episode is essential listening.

    Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support.

    Follow us on:
    LInkedIn
    Substack
    続きを読む 一部表示
    27 分
まだレビューはありません