Hi everyone, Alex here again. Today we’re talking about a change in Active Directory authentication that may look small on paper but could have very real operational consequences if administrators are not prepared. In just over a month, the April Windows update will shift Kerberos service tickets to AES encryption by default, moving domains further…
Tag: identitysecurity
Architecture Over Illusion: How I Secure Azure Environments in the Real World
When people say “we secure Azure”, they usually mean a collection of enabled settings. MFA is on. Defender is enabled. Policies are applied. Secure Score looks respectable. Formally, everything appears correct. In practice, that may not be the case. The cloud does not forgive illusions. It scales faster than teams can fully grasp the consequences…
Microsoft Defender and Intune. How device risk becomes enforcement
Most descriptions of the Defender and Intune integration stop at vague phrases about improved security. That explains nothing. What actually matters is how risk signals move through the system, where decisions are made, and why this architecture is fundamentally different from traditional endpoint protection. This integration is not about antivirus management. It is about closing…
🔥 Zero Trust Architecture: No More Free Passes 🔥
Hey guys, let’s talk about Zero Trust, isn’t a product you buy, it’s a mindset you adopt. The idea: never trust, always verify. Every identity, device, app, and network packet is guilty until proven innocent. Microsoft has gone all-in, embedding Zero Trust principles into Entra, Intune, Defender, Sentinel, Purview, and the rest of the ever-growing…
Hackers Don’t Hack, They Hustle Humans (And They’re Winning)
hi. let’s kill the myth once and for all: hackers don’t break in. they log in. they don’t chase encrypted vaults or fight with multi-layered firewalls. they go for people. because people are the weakest, squishiest, most exploitable part of any system. Daniëlle Haneveer hit the nail on the head in her recent post: attackers…