In short: an attacker does not smash your mailbox to bits, they nick your pass and stroll straight in. It is subtler, neater and a hundred times worse for defenders. If an attacker has a valid token, MFA and passwords become mere decorations. Below is a hard-technical breakdown with a healthy dose of irony. Pass…
The Gentleman’s Guide to Cloud Domination: Azure, AI & Afternoon Tea
From a Rather Good Idea to Proper Scale Building Cloud Spires Without the Dreadful Bill Creating digital products these days is rather like assembling flat-pack furniture from that well-known Swedish retailer, but having rather mislaid the instructions. It presents a splendid opportunity to spend twice what one had initially intended. Fortunately, there are ways to…
Bill, You’d Never Believe What Windows Is Doing Now (email#0 to young mr. B.Gates)
Dear Bill, I know you just start Microsoft, but you wouldn’t believe where Windows has ended up. It’s 2025, and Microsoft just dropped Windows 11 25H2. Relax — they didn’t reinvent the wheel again, just polished the spokes and painted the logo shinier blue. It’s the kind of update that arrives quietly, fixes a few…
Azure Leaderboard 2025: The Unsung Heroes of Microsoft Q&A
Every month, Microsoft quietly refreshes its Azure Leaderboard — a neat little Hall of Fame for people who spend their nights fixing strangers’ Azure problems before their own servers crash. It’s not a marketing stunt and it’s not a paid gig. It’s pure community obsession.And only non-Microsoft contributors qualify — the die-hard enthusiasts who keep…
Embedded HSMs in the Cloud? Yes, Microsoft Just Went There
TL;DR: Microsoft is moving from centralised HSM clusters to embedded hardware modules built straight into the host silicon. Lower latency, higher throughput, and a new level of “I actually own my keys” confidence. It’s a big shift — for engineers, not marketers. 1. Hook You thought your keys were safe in the cloud? Think again….
Outlook Auto-Archive: The Feature Everyone Ignores Until Their Inbox Explodes
A Love Letter to the Terminally Cluttered Ah, Outlook. Actually I’m not a big fun of Auto-Archiving. The place where good intentions go to die — buried under 12,000 unread emails, half of which are “RE: RE: RE: Lunch?”. And then one day, it hits you: Outlook takes five minutes to open, search results look…
Inside the Attack Chain: When Azure Blob Becomes Azure Blob-Up
The “Oops, Our Data Is Public” Classic There’s something poetic about cloud breaches — the elegance with which humans keep inventing new ways to leave their doors open.This week’s culprit: Azure Blob Storage.Yes, that humble blue box that quietly holds your AI datasets, backups, HR archives, and — apparently — the keys to your digital…
11 Days Left: The Sunset of Microsoft Entra Permissions Management
Intro: The Calm Before the Access Storm You know that quiet moment before the IT department realises a product’s gone dark?Yeah — that’s now. Microsoft Entra Permissions Management (the CIEM solution many of us quietly relied on to keep multicloud access sane) is going off support on 1 November 2025.No fanfare. No extensions. Just: it’s…
When Your PC Becomes Smarter Than You (Yes, It’s Happening)
Microsoft has just announced a bold new chapter for Windows — they want every Windows 11 PC to become an AI PC, with Microsoft Copilot at the heart of it. No more “AI if you’ve got a Copilot+ machine and an NPU” caveats. This time the deal is: your PC, your voice, your assistant. Here’s the breakdown…
Killing Passwords (Without Killing Productivity): A Practical Guide to Phishing-Resistant Authentication
Passwords are the flip phones of cybersecurity — nostalgic, yes, but utterly obsolete.In a Zero Trust world, passwords are no longer your friend; they’re your weakest link. Microsoft’s password scrambline initiative is not just another shiny idea. It’s a deliberate move towards a world where passwords simply don’t exist.Combine that with enforcing passwordless authentication for…