Zero-Trust

The Model Isn't the Risk. …

Hero image generated by ChatGPT This is a personal blog and all content herein is my personal opinion and not that of my employer. This is Part 3 of a 3-part series. Part Title Part 1 The Leak, the Context, and the Framework Part 2 Mapping the Trust Boundaries and the Attack Tree Part 3 (this post) …

The Model Isn't the Risk. …

Hero image generated by ChatGPT This is a personal blog and all content herein is my personal opinion and not that of my employer. This is Part 2 of a 3-part series. Part Title Part 1 The Leak, the Context, and the Framework Part 2 (this post) Mapping the Trust Boundaries and the Attack Tree Part 3 …

Security Amnesia: Why …

This is a personal blog and all content herein is my personal opinion and not that of my employer. Introduction We spend millions securing systems and training people – and yet we still fall for the same attacks. Phishing, reusing passwords, skipping MFA. Why? This post isn’t about flaws in …

InsomniHack & Entra …

This is a personal blog and all content herein is my personal opinion and not that of my employer. Introduction I recently had the privilege of attending the OFFENSIVE ENTRA ID AND HYBRID AD SECURITY workshop run by the brilliant Dirk-jan Mollema - author of offensive security tools ROADtools, …