Well, my Friday 13th started well until that was just before lunchtime, we started to hear rumblings of Office shortcuts disappearing from User Desktops, and it […]
If your role is responsible for designing and developing a cybersecurity strategy to protect your organization’s mission and business… Continue reading on Medium »
A recent topic of conversation with colleagues, friends in the technical community, and customers I work with, has been how I manage and deploy lab environments. […]
The Microsoft Security Ninja Training has gained a lot of traction in recent years. So following on from my previous blog post on Resources for Microsoft […]
Microsoft’s ongoing investment in security has led to a structured setup of Microsoft Security Exams covering from fundamentals to Expert level exams, but this leads to […]
As you may know, I maintain a range of Terraform environments for Azure, which can be used for Demos, Labs, Learning and Testing. These are maintained […]
Welcome back fellow geeks! Over the past few years I’ve written a ton on Private Endpoints for PaaS (platform-as-a-service) services Microsoft provides. I haven’t written anything […]
On July 27, 2022, Microsoft discovered a vulnerability in macOS that can allow attackers to bypass application execution restrictions imposed by Apple’s Gatekeeper security mechanism, designed […]
Today, we are glad to release the third version of the threat matrix for Kubernetes, an evolving knowledge base for security threats that target Kubernetes clusters. […]
Over the past several years, the cryptocurrency market has considerably expanded, gaining the interest of investors and threat actors. Cryptocurrency itself has been used by cybercriminals […]
Within any Cloud Environment, a solid Cloud Foundation is an essential part of the journey. The creation of a suitable foundation should ideally occur well before […]