Welcome to The Zero Trust Zone — your go-to podcast for all things Microsoft 365 Security and beyond.

Each episode dives into the ever-evolving world of cloud security, exploring the latest features, tools, and strategies across Microsoft Entra, Defender, Purview, and the broader Microsoft Security stack. Whether you’re a security architect, IT pro, or just curious about how to keep your digital world locked down, you’re in the right place.

But this isn’t just another patch notes rundown. We go deeper — unpacking real-world use cases, breaking down new capabilities, and occasionally veering off the well-beaten path to tackle broader cybersecurity topics, industry trends, and expert insights.

No fluff. Just practical, modern security — delivered with a healthy dose of curiosity, humor, and zero trust!

Subscribe, tune in, and join us in the zone.

Episode 3 - Entra ID Governance

In this episode of The Zero Trust Zone, we tackle a topic many teams avoid—identity governance—and show why it’s absolutely essential in a Zero Trust world. Joining us is Microsoft MVP and identity expert Jan Vidar Elven, who breaks down how Microsoft Entra Identity Governance can help organizations automate, secure, and streamline access—without drowning in complexity.

Episode 2 - Bastion Tenants

Welcome back to The Zero Trust Zone! In this episode, we’re joined by Microsoft MVP and identity security expert Thomas Naunheim to dive deep into a powerful Zero Trust design pattern: the bastion tenant. 👉 What is a bastion tenant? 👉 Why are more organizations isolating their admin identities into separate, hardened tenants? 👉 Is this a must-have security strategy—or just a legacy relic from on-prem Active Directory guidance? We break down what a bastion tenant really is, how it fits into your modern cloud architecture, and whether it’s worth implementing in your own environment.

Episode 1 - Decentralized Identities

In this episode of the Zero Trust Zone podcast, host Michael Van Horenbeeck speaks with Rohit Gulati from Microsoft about decentralized identities and their growing importance in cybersecurity. They discuss the principles of decentralized identity, the role of trust systems, and how Microsoft is addressing these challenges with its verified ID solution. The conversation also touches on the need for portable identities, the balance between authorization and authentication, and the future of identity management in a rapidly evolving digital landscape.