Blogs
Security Bytes: What is …
Welcome to the latest of my Security Bytes posts, where I dig into areas of interest in Infosec/CyberSec, and offer my opinion. In my last post, I talked about the many challenges of implementing Least Privilege. You may have been forgiven for thinking this is all just too hard to do right from day …
Security Bytes: What is …
Welcome to the latest of my Security Bytes posts, where I dig into areas of interest in Infosec/CyberSec, and offer my opinion. In my last post, I talked at a high level about what Least Privilege actually is. In this post, I’ll explore common approaches taken/tooling used to address some of …
Security Bytes: What is …
Welcome to the latest of my Security Bytes posts, where I dig into areas of interest in Infosec/CyberSec, and offer my opinion. In my last post, I talked at a high level about the history of computers and privileged access. In this post, I want to get into a term you may hear a lot of if you work in …
Security Bytes: What is …
This post is the first in a series of posts on the challenges of balancing privileged access with a robust security posture and a challenging delivery pipeline. It is also the first of my Security Bytes posts, where I dig into areas of interest in Information Security/Cyber Security, and offer my …
SC-300: Microsoft …
Intro I recently managed to pass the Microsoft Certified : Identity and Access Administrator (SC-300) exam. Preparation This time around I prepped a little differently. I attended the Microsoft SC-300 training course last week (Monday through Thursday). I took the evenings off to let my brain relax. …
AZ-500: Microsoft …
Intro I recently managed to pass the Microsoft Certified : Azure Security Engineer Associate exam. Those of you that know me well will know that I’m not normally an exam/certification junkie - I’ve avoided them since high school all the way through my professional career until I went for …