• The Paradigm Shift Of Zero Trust

    Zero Trust is a principle of security architecture that assumes that devices, users, applications operating from the internal network perimeter are untrusted and potentially compromised until proven otherwise. If you’re unfamiliar with the way security architecture has been run, here’s a handy image to illustrate the difference Whereas traditional permimeter-based...


  • Restricting Sign Ins with Azure Active Directory

    A customer I was working with told me: “We’re an international organization and most of our users travel around their native country. We have execitives that sometimes travel internationally. We’ve had some users succumb to phishing attempts from overseas so we’d like to restrict sign-ins from outside the country. How...


  • Enable MFA to secure guest access

    MFA is the gold standard control for information security. In this post, I’ll show you step by step on configuring MFA to guest accounts as well as a one big change you should consider making for this to take effect. I should note from the onset that this applies to...


  • Modern Device Management with Intune - Part 2

    Disclaimer: As a Microsoft employee, the below opinions are mine alone and do not necessarily reflect the opinions of Microsoft. Enabling a Bring-your-own-device Policy with Intune Here’s the scenario: A user broke their device and they’re hundred of miles away huddled in their apartment. You’re huddled away as well in...


  • Modern Device Management with Intune - Part 1

    Disclaimer: As a Microsoft employee, the below opinions are mine alone and do not necessarily reflect the opinions of Microsoft. Part of an exciting development professionally is being able to speak and show more broadly to an engaged audience cybersecurity best practices and demonstrate how Microsoft is taking steps to...