Technical Writing
Tech Blog
Cloud security, identity, infrastructure, and research. Deep dives, tools, and practical guidance.
Security Bytes: What is Least Privilege and why you should care about it - Implementation and Challenges
Welcome to the latest of my Security Bytes posts, where I dig into areas of interest in Infosec/CyberSec, and offer my opinion. In my last post, I talked at a high level about what Least Privilege actually is. In this …
Security Bytes: What is Least Privilege and why you should care about it - What is Least Privilege
Welcome to the latest of my Security Bytes posts, where I dig into areas of interest in Infosec/CyberSec, and offer my opinion. In my last post, I talked at a high level about the history of computers and privileged …
Security Bytes: What is Least Privilege and why you should care about it - History
This post is the first in a series of posts on the challenges of balancing privileged access with a robust security posture and a challenging delivery pipeline. It is also the first of my Security Bytes posts, where I …
SC-300: Microsoft Certified : Identity and Access Administrator
Intro I recently managed to pass the Microsoft Certified : Identity and Access Administrator (SC-300) exam. Preparation This time around I prepped a little differently. I attended the Microsoft SC-300 training course …
AZ-500: Microsoft Certified Azure Security Engineer Associate
Intro I recently managed to pass the Microsoft Certified : Azure Security Engineer Associate exam. Those of you that know me well will know that I’m not normally an exam/certification junkie - I’ve avoided …
How to capture network traffic on a windows server without installing wireshark on the server
Intro If you need to capture network traffic from a Windows server, you may find that that standards or controls in your organisation prevent or forbid you from installing tools such as Wireshark on your Windows servers. …