Blog

Keeping up to date with Tech, Cloud and Security info
Keeping up to date with …

Cover Photo by Markus Winkler on Unsplash

Introduction

In this post, I’m going to talk about something that comes up often enough that its probably worth a post now!

I’m often asked how I manage to keep up with whats going in tech in general, and Cloud and Information …

Site Structure Changes

This is a very quick update to make you aware of some changes I’ve made:

  1. There is a new Personal Blog section for my non-technical blog posts and I have moved my Job Interview and Invisible Illness posts there.
  2. There is a new My Writing section for my fiction pieces (poetry, short stories). …

What are shadow admins in Windows, why should you care and what can you do about them?
What are shadow admins in …

Cover Photo by David East on Unsplash

Introduction

In this post, I’m going to talk about a concept you may have heard of (shadow admins), what they are, why they are a problem you need to care about, and what to do about them.

What is a shadow admin?

The name should be fairly self …

Becoming a Microsoft Security Researcher
Becoming a Microsoft …

Cover Photo by National Cancer Institute on Unsplash

Introduction

In this post, I’m going to talk about becoming a Microsoft Security Researcher. I mentioned this in my last post. I sort of brushed over it but when I was speaking to one of my colleagues and friends about the post just before …

Azure Linux VM Agent leaks secrets || How to harden your config
Azure Linux VM Agent …

Cover Photo by Joe Zlomek on Unsplash

In this post, I’m going to talk about something that I discovered whilst working on a project a little while ago, some default behaviour in the Microsoft Azure Linux VM Agent which can lead to credential/secret leakage in your linux VM.

What is the Azure …

Security Bytes: What is Least Privilege and why you should care about it - Lets fix this
Security Bytes: What is …

Welcome to the latest of my Security Bytes posts, where I dig into areas of interest in Infosec/CyberSec, and offer my opinion.

In my last post, I talked about the many challenges of implementing Least Privilege. You may have been forgiven for thinking this is all just too hard to do right from day …