Blogs

Security Bytes: What is Least Privilege and why you should care about it - History
Security Bytes: What is …

This post is the first in a series of posts on the challenges of balancing privileged access with a robust security posture and a challenging delivery pipeline.

It is also the first of my Security Bytes posts, where I dig into areas of interest in Information Security/Cyber Security, and offer my …

SC-300: Microsoft Certified : Identity and Access Administrator
SC-300: Microsoft …

Intro

I recently managed to pass the Microsoft Certified : Identity and Access Administrator (SC-300) exam.

Preparation

This time around I prepped a little differently.

I attended the Microsoft SC-300 training course last week (Monday through Thursday). I took the evenings off to let my brain relax. …

AZ-500: Microsoft Certified Azure Security Engineer Associate
AZ-500: Microsoft …

Intro

I recently managed to pass the Microsoft Certified : Azure Security Engineer Associate exam.

Those of you that know me well will know that I’m not normally an exam/certification junkie - I’ve avoided them since high school all the way through my professional career until I went for …

How to capture network …

Intro

If you need to capture network traffic from a Windows server, you may find that that standards or controls in your organisation prevent or forbid you from installing tools such as Wireshark on your Windows servers.

This may be enforced by AppLocker or other controls.

However, if you do have …

How to use your Raspberry …


If you like what I do and appreciate the time and effort and expense that goes into my content you can always Buy Me a Coffee at ko-fi.com


Overcoming power supply …

Intro

In my first post in my Raspberry Pi NAS series, I mentioned I had issues with my external hard drives and had to buy an external (powered) USB hub, but I didn’t elaborate further.

What’s The Issue?

Among the many changes from its predecessor, the Raspberry Pi 4 now uses USB-C as …