Subscribe
Sign in
Home
Podcast
Notes
Chat
Rod's Fiction Books
Security Copilot
Monday Minutes
AI
KQL
Quantum
Microsoft Sentinel
Misc
Archive
Leaderboard
About
Latest
Top
Discussions
Rod Trent's Monday Minutes for January 20, 2025
From Biden's executive order on cybersecurity to TikTok users moving to Rednote
19 hrs ago
•
Rod Trent
Share this post
Rod’s Blog
Rod Trent's Monday Minutes for January 20, 2025
Copy link
Facebook
Email
Notes
More
3:31
Hidden Dangers of Home Technology: Protecting Your Work Data and Devices
Unseen Threats Lurking in Your Household that Could Impact Your Work Life
21 hrs ago
•
Rod Trent
1
Share this post
Rod’s Blog
Hidden Dangers of Home Technology: Protecting Your Work Data and Devices
Copy link
Facebook
Email
Notes
More
Security Copilot Prompt of Inaugural Day: What are the key security measures being implemented to protect the U.S. presidential inauguration…
Security Copilot Prompt of Inaugural Day: What are the key security measures being implemented to protect the U.S.
21 hrs ago
•
Rod Trent
Share this post
Rod’s Blog
Security Copilot Prompt of Inaugural Day: What are the key security measures being implemented to protect the U.S. presidential inauguration from cyber threats?
Copy link
Facebook
Email
Notes
More
Creating Custom Microsoft Sentinel Data Connectors Using Functions
Enhancing Your Security Insights with Customized Data Integration
Jan 17
•
Rod Trent
1
Share this post
Rod’s Blog
Creating Custom Microsoft Sentinel Data Connectors Using Functions
Copy link
Facebook
Email
Notes
More
Security Copilot Prompt of the Day: Ask MSDocs to give an overview of threat detection and response features in Microsoft Sentinel.
Security Copilot Prompt of the Day: Ask MSDocs to give an overview of threat detection and response features in Microsoft Sentinel.
Jan 17
•
Rod Trent
Share this post
Rod’s Blog
Security Copilot Prompt of the Day: Ask MSDocs to give an overview of threat detection and response features in Microsoft Sentinel.
Copy link
Facebook
Email
Notes
More
After the Blog Episode 18: The Cybersecurity Bell Curve and Generative AI
Listen now | The Cybersecurity Bell Curve is an invaluable framework especially when it comes to securing Generative AI applications.
Jan 16
•
Rod Trent
Share this post
Rod’s Blog
After the Blog Episode 18: The Cybersecurity Bell Curve and Generative AI
Copy link
Facebook
Email
Notes
More
6:01
Securing Microsoft Copilot
Integrating Responsible AI and Advanced Security Measures
Jan 16
•
Rod Trent
1
Share this post
Rod’s Blog
Securing Microsoft Copilot
Copy link
Facebook
Email
Notes
More
Security Copilot Prompt of the Day: How do I create and manage compliance policies in Microsoft Intune?
Security Copilot Prompt of the Day: How do I create and manage compliance policies in Microsoft Intune?
Jan 16
•
Rod Trent
Share this post
Rod’s Blog
Security Copilot Prompt of the Day: How do I create and manage compliance policies in Microsoft Intune?
Copy link
Facebook
Email
Notes
More
Locking Down Security for PowerShell: Best Practices and Strategies
Enhancing Your PowerShell Environment's Security
Jan 15
•
Rod Trent
1
Share this post
Rod’s Blog
Locking Down Security for PowerShell: Best Practices and Strategies
Copy link
Facebook
Email
Notes
More
Security Copilot Prompt of the Day: What are the best practices for securing data in Microsoft 365?
Security Copilot Prompt of the Day: What are the best practices for securing data in Microsoft 365?
Jan 15
•
Rod Trent
Share this post
Rod’s Blog
Security Copilot Prompt of the Day: What are the best practices for securing data in Microsoft 365?
Copy link
Facebook
Email
Notes
More
After the Blog Episode 17: Using a Samsung Tablet as a Second Screen
Showtime for Samsung snobbery
Jan 14
•
Rod Trent
Share this post
Rod’s Blog
After the Blog Episode 17: Using a Samsung Tablet as a Second Screen
Copy link
Facebook
Email
Notes
More
6:36
The Rising Threat of Smart Home Device Attacks
Cybercriminals Targeting the Heart of Our Homes
Jan 14
•
Rod Trent
Share this post
Rod’s Blog
The Rising Threat of Smart Home Device Attacks
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts