Music
Music has always been something I felt pulled toward creating, not just listening to, but building from the ground up. For as long as I […]
Music has always been something I felt pulled toward creating, not just listening to, but building from the ground up. For as long as I […]
As organizations move toward AI-driven productivity, DLP and DSPM become the safeguards that determine whether Copilot remains a trusted assistant or becomes a source of […]
The Zero Trust Assessment is one of the most practical ways to understand your Microsoft 365 environment’s actual security posture. It moves beyond theory and […]
Achieving and maintaining CMMC compliance requires more than policy awareness—it demands disciplined execution across people, processes, and technology. There are practical steps for implementing and […]
Fixing oversharing in SharePoint and OneDrive is one of the most essential steps in preparing your tenant for Microsoft 365 Copilot. Because Copilot only operates […]
The Cybersecurity Maturity Model Certification (CMMC) defines how defense contractors must safeguard sensitive information across the Defense Industrial Base. Understanding its structure—the maturity levels, domains, […]
Microsoft 365 Copilot continues to evolve beyond a simple AI assistant. It is now a platform that organizations can extend with custom agents, plugins, and […]
Securing Copilot for Microsoft 365 begins with securing identity. Before the AI ever touches your data, your authentication posture, Conditional Access strategy, and device trust […]
Preparing your data protection platform for Copilot is not optional. It is the foundation that determines whether AI enhances productivity or exposes risk. The essential […]
Determining what systems fall within the scope of CMMC is one of the most critical steps in achieving compliance. For organizations using Microsoft 365 and […]
The Cybersecurity Maturity Model Certification (CMMC) is transforming how defense contractors secure and manage information within the Defense Industrial Base. Understanding its requirements is essential […]
As AI systems become more embedded across the enterprise, the security surface expands with them. Microsoft’s November 2025 updates reflect a significant shift toward treating […]
If you’ve been working on “doing Zero Trust” for a while, you’ve probably hit the same wall I see everywhere: lots of guidance and checklists, […]
So, I have been living in my own world for a while and feel like I have been very quiet. For the past few years, […]
Fifteen years ago, when my family and I moved to the US, the demands on my time were different. As things have settled down and […]
Firstly, Happy New Year to you all. I hope you had a great holiday season enjoying time spent with family, exchanging gifts, or just enjoying […]
Today a new course of mine was launched today over at Cybrary, called “Basic Threat Modeling“. Go get an account if you don’t have one, […]
I am considering running a two-day training course on Microsoft 365 Security in January 2025 in Oahu, Hawaii, and wanted to gauge interest. This training […]
Over the past few months, I have been working on a diverse range of course content and they have released. I am also working on […]
Use this playlist to boost productivity during work sessions or energize your running routines. These tracks are a look into Japanese Breakcore, a derivative of […]
Firstly, let’s get right to it and remind you that mainstream support for SharePoint 2016 and 2019 ended January 2024. That means you should be […]
Bypassing Multi-Factor Authentication (MFA) Using Attacks in the Middle (AitM) As more organizations and individuals rely on Multi-Factor Authentication (MFA) to secure their digital assets, […]
I have had several offers to write a computer book throughout my career. However, even though it sounded cool to do it, I had always […]
Hello, As the snowflakes gently fall (well, I hope they do) and the Christmas lights twinkle with festive cheer, I reflect on the […]