AI is no longer a tool – it has become a full-scale attack surface.With the rise of Copilot agents, autonomous LLM workflows and enterprise AI pipelines in 2026, the familiar security landscape has been rewritten. Identity, data protection, DLP, Zero Trust and DevSecOps now require an entirely new architectural lens. This eight-part series explores how…
When an RODC Goes Off the Grid: A Slow, Painful, Very British Death
Oi, folks — today we’re talking about the slow, painful, deeply awkward death of an RODC that’s been cut off from the domain for far too long. You know that moment when a branch office goes offline, someone says “It’ll be fine, the RODC will handle it,”and you — the only sane person in the…
Sysmon Built Into Windows? ’Bout Time, Microsoft – The SOC Boys Will Be Buzzing
Oy, lads and lasses – big Windows news today. Grab your tea, sit down… this one’s a belter. Microsoft’s finally doing the thing we’ve been begging for since the Bronze Age:Sysmon is going native.Yep. Windows 11 and Windows Server 2025 are getting Sysmon baked right in — no downloads, no MSI faffing, no “did you…
Security Copilot: a bit of magic, a lot of engineering, and 10,000 SCU you’ll burn faster than you can say “phishing”
Alright, lads and lasses — hello again, friends.Today we’re diving straight into the delightful chaos otherwise known as Microsoft Security Copilot being bundled into M365 E5. You may have seen the announcement and thought:“Brilliant, free AI for security! What a lovely day.” Calm down, Shakespeare.This isn’t a fairy tale — it’s enterprise security. And as…
Microsoft Is Removing Volume Discounts: What This Means for Enterprise Customers and How to Prepare
Microsoft has confirmed a major commercial change: this November, every organisation with more than 2,399 users will be affected. Regardless of how large your estate is, you will soon be paying the same per-user price for Microsoft 365, Office 365, and all other Online Services. In simple terms, Microsoft is retiring the long-standing Level B/C/D…
“Sign It and Sleep Well”: How Microsoft Turns Code Signatures into a Weapon Against Sabotage
1. The Problem Nobody Likes to Admit We live in an age where attackers don’t need to breach your servers — they just slip quietly into your software supply chain.Compromise one build machine, steal one signing key — and suddenly your “official update” is a trojan in a tuxedo. SolarWinds, CCleaner, 3CX — all household…
Five Management Bugs That Make Senior IT Professionals Leave
Every company moans about the “talent shortage”.But most of them are busy pushing out the very people who kept the lights on.You know — the engineers who survived Windows NT, Exchange 2003, and three CIOs in one quarter. They’re not leaving because of salary.They’re leaving because someone in management decided PowerPoint was more important than…
Stop Writing Deployment Test Plans Nobody Reads
Yes, I said it out loud. And no, I don’t regret a damn thing.In the glamorous world of corporate IT, we’ve built a religion around documentation.Every new ERP rollout, CRM upgrade, or Windows migration is accompanied by a sacred text — the Test Plan. A thick, beautifully formatted PDF that no one, absolutely no one,…
Micromanagement and Trust: Opposite Ends of Leadership in the IT World
Hey All… lets talk about Micromanagement and Trust in IT. Throughout my long career, working in various companies, including US management style, I have been on both sides—as an owner and founder of Company, as a manager-leader of a big team with huge budget, a lead engineer, and a regular engineer. Fortunately, this has allowed…
How they hijack Microsoft Teams via tokens (and what to do while everyone sips their coffee)
In short: an attacker does not smash your mailbox to bits, they nick your pass and stroll straight in. It is subtler, neater and a hundred times worse for defenders. If an attacker has a valid token, MFA and passwords become mere decorations. Below is a hard-technical breakdown with a healthy dose of irony. Pass…