Technical Writing
Tech Blog
Cloud security, identity, infrastructure, and research. Deep dives, tools, and practical guidance.
What are shadow admins in Windows, why should you care and what can you do about them?
Detect and remove shadow admins
Becoming a Microsoft Security Researcher
Introduction In this post, I’m going to talk about becoming a Microsoft Security Researcher. I mentioned this in my last post. I sort of brushed over it but when I was speaking to one of my colleagues and friends …
Azure Linux VM Agent leaks secrets || How to harden your config
In this post, I’m going to talk about something that I discovered whilst working on a project a little while ago, some default behaviour in the Microsoft Azure Linux VM Agent which can lead to credential/secret …
Security Bytes: What is Least Privilege and why you should care about it - Lets fix this
Welcome to the latest of my Security Bytes posts, where I dig into areas of interest in Infosec/CyberSec, and offer my opinion. In my last post, I talked about the many challenges of implementing Least Privilege. You may …
Security Bytes: What is Least Privilege and why you should care about it - Implementation and Challenges
Welcome to the latest of my Security Bytes posts, where I dig into areas of interest in Infosec/CyberSec, and offer my opinion. In my last post, I talked at a high level about what Least Privilege actually is. In this …
Security Bytes: What is Least Privilege and why you should care about it - What is Least Privilege
Welcome to the latest of my Security Bytes posts, where I dig into areas of interest in Infosec/CyberSec, and offer my opinion. In my last post, I talked at a high level about the history of computers and privileged …