Sooo….. Yesterday Microsoft quietly released Windows 11 version 26H1 and almost immediately had to clarify that this is not the next major feature release. There are no new Start menu redesigns and no dramatic UX changes. What is changing sits much deeper in the stack. Are you ready 🙂 so go ahead! 26H1 is not…
BYOD through Microsoft Entra Global Secure Access. What actually happens under the hood
When people talk about BYOD, it usually sounds like freedom. Let employees work from their own laptops and phones. Save on hardware. Everyone is happy. In reality, BYOD is always about one uncomfortable question: how do you control access when you do not control the device? This is where Microsoft Entra Global Secure Access comes…
How AI is reshaping cyber threats and how Microsoft really deals with it in 2026
By 2026 artificial intelligence is no longer something that security teams discuss in strategy decks or conference talks. It is something they encounter on a Monday morning when alerts start coming in before anyone has finished their coffee. AI quietly changed the rhythm of attacks. There is no preparation phase anymore. No clear start. No…
Microsoft Defender and Intune. How device risk becomes enforcement
Most descriptions of the Defender and Intune integration stop at vague phrases about improved security. That explains nothing. What actually matters is how risk signals move through the system, where decisions are made, and why this architecture is fundamentally different from traditional endpoint protection. This integration is not about antivirus management. It is about closing…
Stop treating Intune like “SCCM in the cloud”. Now add security, properly
A lit bit diff format, but lets see if you would like it my dear friends. So. Once security enters the picture, the illusion that Intune is “just SCCM with a web UI” collapses completely. In the SCCM world, security was something you layered on top. You deployed agents, configured settings, maybe pushed antivirus definitions,…
Decomposing Meaning: How Not to Split a Task into Atoms and Kill Its Soul
Hello, it’s Alex again. Last time, we agreed on one thing: trust is not a philosophy. It’s infrastructure. A protocol that can be designed. You reacted, and many of you asked the same question: “Alright, we removed micromanagement. We stopped hovering. We gave autonomy. What next? Will the team just start performing miracles on its…
From Trust to Delegation: What Really Happens When You Let Go of the Reins
Hello, it’s Alex again. Last time, we unpacked why micromanagement is a system failure https://ctrlaltdel.blog/archives/786 , and trust is the new operating system. Sounds like a win, doesn’t it? You recognised the problem, stopped hovering over everyone’s shoulder, and decided to trust. And that’s when a new, far subtler challenge appears. I call it the…
Microsoft Sentinel — What’s New in January 2026
Oh well, hello there, folks… After a long Christmas break — the kind where even your SOC starts snoring softly and the alert queue feels blissfully distant — we’re finally back to real life. The coffee is strong again.The analysts are sarcastic again.And AI, naturally, is still trying to behave like an employee with far…
CHAPTER 8/8 THE FINAL BLUEPRINT (2026). The Complete Technical Architecture of a Secure AI Platform
0. Prologue: “An AI platform isn’t a model. It’s an organism.” It has:• blood (data),• an immune system (Purview + ZTA),• a nervous system (identity),• a brain (the LLM),• organs (tools/plugins),• muscles (the execution layer),• skin (the output firewall),• memory (vector stores),• an immune response (Defender + analytics),• a skeleton (governance + policies),• metabolism (pipelines),•…
CHAPTER 7/8 AI Security Engineering & R&D (2026 Edition)
0. Prologue: “AI Security is the one discipline where engineers and cryptographers have suddenly become indispensable again.” The attack landscape of 2026 no longer requires generic DevOps or IT Pros.It demands engineers who actually understand: tokens cryptography sandbox runtime memory layout tool isolation ML pipelines data planes governance layers threat modelling MITRE-AI systems architecture This…