Bill C-26: A Review

Let’s have a look at Canada’s latest cyber security regulation.

Read more

Microsoft Identity Platform: OAUTH Basics

I break down and go into detail around the OAuth process and how it works as one of the defining protocols that’s used in the Microsoft Identity Platform.

Read more

An exploration of managed identities on Azure Virtual Machines

Managed Service Identities for VMs seem like a great alternative to service principals, but after utilizing them on virtual machines, I am not so sure. I explore recent findings with MSI’s and why you may want to reconsider their use.

Read more

Microsoft Identity Platform: Series Intro

This series aims to go-over, in detail, the Microsoft Identity Platform and how the underlying components work to create secure authorization and authentication systems.

Read more

Security Testing With Containers

Testing container deployments doesn’t have to be difficult. The arrival of docker has allowed for a portable unit of software to be available on most types of machines and OS. More and more developers are using docker in their deployment and development workflows. Why not security test with docker as well?

Read more