Technical Writing
Tech Blog
Cloud security, identity, infrastructure, and research. Deep dives, tools, and practical guidance.
Keeping up to date with Tech, Cloud and Security info
Introduction In this post, I’m going to talk about something that comes up often enough that its probably worth a post now! I’m often asked how I manage to keep up with whats going in tech in general, and …
Site Structure Changes
This is a very quick update to make you aware of some changes I’ve made: There is a new Personal Blog section for my non-technical blog posts and I have moved my Job Interview and Invisible Illness posts there. …
What are shadow admins in Windows, why should you care and what can you do about them?
Detect and remove shadow admins
Becoming a Microsoft Security Researcher
Introduction In this post, I’m going to talk about becoming a Microsoft Security Researcher. I mentioned this in my last post. I sort of brushed over it but when I was speaking to one of my colleagues and friends …
Azure Linux VM Agent leaks secrets || How to harden your config
In this post, I’m going to talk about something that I discovered whilst working on a project a little while ago, some default behaviour in the Microsoft Azure Linux VM Agent which can lead to credential/secret …
Security Bytes: What is Least Privilege and why you should care about it - Lets fix this
Welcome to the latest of my Security Bytes posts, where I dig into areas of interest in Infosec/CyberSec, and offer my opinion. In my last post, I talked about the many challenges of implementing Least Privilege. You may …