Azure Networking Fundamentals with Bryan Woodworth

Bryan Woodworth joins the Azure Fundamentals series to discuss Networking Fundamentals with a live whiteboard session. Connect with Bryan on linkedin at *About vBrownBag* SUBSCRIBE! Socials: Twitter: Facebook: iTunes: Google+: is a community of people who believe in helping other people. Specifically we work in IT infrastructure and[…]

Microsoft Office 365: Do you need data protection for your cloud? By Phoummala Schmitt (@ExchangeGoddess) and Theresa Miller(@24x7ITConnect)

Phoummala Schmitt and Theresa Miller discuss data protection in Office 365 You can find Phoummala online at and on twitter at You can find Theresa online at and on twitter at If you would like to submit a vBrownbag Tech Talk at VMworld 2018 please fill out this form before June[…]

VMware vSphere 6.7 Security Features w/ Mike Foley (@mikefoley)

Mike Foley (@MikeFoley) discusses the new security features of vSphere 6.7 3:38 – ESXi and TPM 2.0 14:30 – Windows 10 & 2016 Security Features Support 35:15 – VM Encryption in HTML5 UI 40:06 – vSphere 6.7 Security Resources *About vBrownBag* SUBSCRIBE! Socials: Twitter: Facebook: iTunes: Google+: is[…]

Impostor Syndrome – A Tech Trivia Game Show

We had a few openings for VMworld Europe Tech Talks this year, so I had a couple of drinks and got to thinking. I’ve been playing around with the idea of doing a tech trivia podcast for a while now, but I kept making excuses of why I wouldn’t be good enough to get it[…]

#vBrownBag Follow-Up What’s New in vSphere 6 Security w Mike Foley (@mikefoley)

Mike Foley stops by to discuss new security features in VMware vSphere 6.0 including items such as the improved lockdown mode. vSphere 6.0 Security Video You can find Mike on Twitter @mikefoley and security information @vSphereSecurity as well as regular posts on Originally published at http://vbrownbag.comm – Sign up for the live #vBrownBag broadcast at http://vbrownbag.comm/brownbags/ where you[…]

Getting Started with SpiderFoot

At some point in my past, I may or may not have done some InfoSec. As part of that role, “foot printing” a target was a tedious task. Basically, you would try to find anything and everything you could about said target, without actually engaging. When you consider the number of datasources available (Google,,[…]