Technical Writing
Tech Blog
Cloud security, identity, infrastructure, and research. Deep dives, tools, and practical guidance.
Security Bytes: What is Least Privilege and why you should care about it - History
This post is the first in a series of posts on the challenges of balancing privileged access with a robust security posture and a challenging delivery pipeline. It is also the first of my Security Bytes posts, where I …
SC-300: Microsoft Certified : Identity and Access Administrator
Intro I recently managed to pass the Microsoft Certified : Identity and Access Administrator (SC-300) exam. Preparation This time around I prepped a little differently. I attended the Microsoft SC-300 training course …
AZ-500: Microsoft Certified Azure Security Engineer Associate
Intro I recently managed to pass the Microsoft Certified : Azure Security Engineer Associate exam. Those of you that know me well will know that I’m not normally an exam/certification junkie - I’ve avoided …
How to capture network traffic on a windows server without installing wireshark on the server
Intro If you need to capture network traffic from a Windows server, you may find that that standards or controls in your organisation prevent or forbid you from installing tools such as Wireshark on your Windows servers. …
Overcoming power supply and software issues with a Raspberry Pi4
Intro In my first post in my Raspberry Pi NAS series, I mentioned I had issues with my external hard drives and had to buy an external (powered) USB hub, but I didn’t elaborate further. What’s The Issue? …
How to use your Raspberry Pi as a NAS/Media Centre: Part 2
Intro In my last post, I walked you through the basic setup and Operating System install of a Raspberry Pi. Now lets move onto making it a NAS/Media Centre device. I actually went down 2 different paths - initially I …