

Meet the Scholars: Incredible Voices Shaping the Future of Tech
I had the privilege of meeting these inspiring scholars in Dallas, and their passion for technology left a lasting impression. In this feature, they share their journeys into IT, what the conference meant to them, their career ambitions, and the impact they hope to make in the next five years. Meet the scholars shaping the future of tech.
19 hours ago13 min read


Becoming a Microsoft MVP
Becoming a Microsoft MVP in Security wasn’t a straight line. From rejection on April Fool’s Day to battling imposter syndrome and self-doubt, this is the honest story behind my journey into cybersecurity and the Microsoft MVP Program. No polished highlight reel - just resilience, community, Microsoft Purview, and learning to water your own grass.
5 days ago5 min read


How to Use PIM with RBAC Roles: Purview, Exchange, and More
Discover how to use PIM with RBAC roles to provide just-in-time access for users. Learn setup for Purview, Exchange, and more, plus the pros, cons, and gotchas.
Nov 11, 20259 min read


How to Export Microsoft Purview Permissions (RBAC Roles) Easily
I was recently asked if I knew a way to export Microsoft Purview RBAC roles with members. I couldn’t find a ready solution, so I wrote a PowerShell script. You can get it from my new GitHub Purview repository. Perfect for auditing and managing Purview permissions easily!
Nov 3, 20252 min read


Physical Security Cards: Phish-Resistant Authentication
Explore how physical security cards combine passwordless login and building access, offering secure, simple authentication for modern workplaces.
Oct 21, 20254 min read


Conditional Access Essentials: From Report-Only to Enforced Mode
Moving Conditional Access policies from report-only to enforced mode can secure your environment - or lock everyone out. This post walks through safe rollout strategies using ring deployments, the What If tool, Policy Impact, Log Analytics, Workbooks, Gap Analyzer, and real KQL queries. Learn how to monitor, test, adjust and confidently turn policies on without breaking access or business operations.
Oct 14, 202510 min read


Conditional Access Essentials: Custom Security Attributes in Entra ID and Cross Tenant Scenarios
Learn how to use custom security attributes in Entra ID to target apps that don’t appear in Conditional Access. This step-by-step guide covers attribute sets, names, and values, plus real scenarios like legacy authentication, persona-based targeting, and enforcing MFA. We’ll also explore cross-tenant access settings to securely trust MFA and device claims from partner tenants.
Oct 7, 202513 min read









