Technical Writing

Tech Blog

Cloud security, identity, infrastructure, and research. Deep dives, tools, and practical guidance.

Keeping up to date with Tech, Cloud and Security info
30 Dec 2022 · 6 min read · news · feeds

Keeping up to date with Tech, Cloud and Security info

Introduction In this post, I’m going to talk about something that comes up often enough that its probably worth a post now! I’m often asked how I manage to keep up with whats going in tech in general, and …

26 Dec 2022 · 1 min read · site-news

Site Structure Changes

This is a very quick update to make you aware of some changes I’ve made: There is a new Personal Blog section for my non-technical blog posts and I have moved my Job Interview and Invisible Illness posts there. …

What are shadow admins in Windows, why should you care and what can you do about them?
23 Dec 2022 · 9 min read · cybersecurity · infosec

What are shadow admins in Windows, why should you care and what can you do about them?

Detect and remove shadow admins

Becoming a Microsoft Security Researcher
20 Dec 2022 · 5 min read · cybersecurity · infosec

Becoming a Microsoft Security Researcher

Introduction In this post, I’m going to talk about becoming a Microsoft Security Researcher. I mentioned this in my last post. I sort of brushed over it but when I was speaking to one of my colleagues and friends …

Azure Linux VM Agent leaks secrets || How to harden your config
17 Dec 2022 · 8 min read · security · cybersecurity

Azure Linux VM Agent leaks secrets || How to harden your config

In this post, I’m going to talk about something that I discovered whilst working on a project a little while ago, some default behaviour in the Microsoft Azure Linux VM Agent which can lead to credential/secret …

Security Bytes: What is Least Privilege and why you should care about it - Lets fix this
31 May 2022 · 11 min read · opinion · security

Security Bytes: What is Least Privilege and why you should care about it - Lets fix this

Welcome to the latest of my Security Bytes posts, where I dig into areas of interest in Infosec/CyberSec, and offer my opinion. In my last post, I talked about the many challenges of implementing Least Privilege. You may …