Identity: The New Perimeter in Zero Trust

Reading Time: 12 minutes9 Welcome to the first deep dive in my Zero Trust blog series. If you’ve read the series introduction, you’ll know that Zero Trust isn’t a single product or a quick fix it’s a strategic approach that touches every part of your digital environment. Over the coming posts, I’ll be breaking down each of the core […]

Continue reading

Zero Trust Blog Series: A Microsoft-Centric Approach

Reading Time: 14 minutes11 Introduction Over the past few years, I’ve seen a growing interest in Zero Trust but also a lot of confusion. Many still view it as a product you can buy or a feature you can switch on. In reality, Zero Trust is a mindset a strategic approach to security that requires continuous verification, least privilege access, […]

Continue reading

Secure Dynamic DNS Updates to Azure with AzureDNSSync

Reading Time: 10 minutes9 Introduction Like many home users, my broadband connection comes with a dynamically assigned public IP address. This means that my IP can change at any time sometimes without notice, which can be a problem when I want to access services hosted at home, like a self-hosted server or VPN. Instead of relying on a third-party Dynamic […]

Continue reading

OpenVPN Site-to-Site setup

Reading Time: 23 minutes21 Introduction Setting up a Site-to-Site VPN is a powerful way to securely link two remote networks—such as a home lab and a cloud environment—so they behave as if they’re on the same local network. While there are several technologies available to achieve this, choosing the right one often comes down to your specific network constraints and goals. […]

Continue reading

Deploying Azure Virtual Desktop – A Modular, Automated Approach

Reading Time: 9 minutes7 Introduction Azure Virtual Desktop (AVD) is Microsoft’s comprehensive Desktop-as-a-Service platform, enabling secure remote access to Windows desktops and apps from virtually anywhere. While powerful, deploying AVD in a robust, enterprise-ready manner can be complex: it requires careful orchestration of network, identity, security, storage, and user access. Manual configuration is time-consuming, error-prone, and difficult to scale or […]

Continue reading

Virtual PAW – Part 2 – Core Components

Reading Time: 10 minutes9 So this is the 2nd part of a multi part series on my journey with Bicep and ARM Templates and deploying AVD as a PAW. Part One was the high level overview of what I have done. Introduction Welcome to the 2nd installment of my posts on using AVD as a PAW. It is probably […]

Continue reading