Skip to content

Blog entries

Don’t get distracted by shiny new toys or Why cybersecurity still needs old-school discipline

Let’s cut through the noise: in the cybersecurity world, there’s a lot of hype about AI, machine learning, and the latest tech wizardry that’s supposed to solve all our problems. But here’s the brutal truth—no amount of fancy new tech is going to save your skin if you’re not nailing the basics. The old-school, unsexy stuff still matters. Policies, discipline, and sticking to what works are what’s going to keep your organization safe.

At my age of 44, with three kids and a half a lifetime experience behind me, I found myself reflecting on the profound impact technology has on our lives. While listening to Nightwish's new song “the day of…”. The world today is vastly different from the one I grew up in, where technology was a tool to simplify tasks and have fun with. Now, it seems to have evolved into a force that not only shapes our daily existence (Smartphones, social media etc.) but also dictates the future.

The human factor in Azure security

Screenshot

The rapid adoption of cloud services like Microsoft Azure has revolutionized business operations but also introduced significant security risks. Human error remains a critical vulnerability, as highlighted by incidents like the "ChaosDB" breach. Misconfigurations, weak passwords, and inadequate monitoring continue to undermine advanced technological defenses. To transform employees from liabilities into assets, organizations must invest in comprehensive training, regular phishing simulations, and continuous learning opportunities.

Azure's suite of security tools, including Azure Security Center and Azure AD Conditional Access, can mitigate human error, but integrating these tools with human vigilance creates a more resilient security posture. Leadership must foster a security-first culture, empowering employees to take ownership of protocols without fear of retribution. As cyber threats evolve, innovative training methods like gamification and AI-driven learning will be essential. The future of cybersecurity in the cloud depends on a balanced investment in both technology and people.

The full writing

Will try to start to write sometimes of what i am doing.

I listened on a pod this morning which was about cybersecurity threats today versus threats 10 years ago. I started to think of how it was to work with IT for twenty years ago versus today. I think i will write an article of it and publish here in a couple of days. Screenshot

Migration of old stuff

I am migration (reviving) the old blog. I have converted and bropught some of my old posts with me. It feels better not to start with a blank slate. Some of it is really old and might be outdated.

SQL Log shipping restore

After last post we copy all backup files from the source to the destination. If all files is on the destination server we can now restore them into a database to complete the log shipping. I will not write about the functions that is the same in both files such as Import-MyModule. See last blog post if you have not read it.

SQL Log Shipping Copy

This is a two-part blog post. The second part will be published within a week. The script was created a while ago and has some minor updates.

Problem

The need was found to have two database servers very similar, without a license for SQL Log shipping. We could use existing backups, as we did a log backup each hour, and copy them to another server for restoration. The process turned out to be more complex than anticipated, especially with SQL clusters.

List all computers with a specific file

Problem to solve

The customer has clients with locally stored application files. The files are from an earlier application and should not be used anymore. I needed to verify that the application files was removed from the clients. I did not want to walk to each 500+ clients so I created a small script to use “test-path” to see if the files were removed and then summarise it.