Introduction: From AI Hype to Practical Enablement Over the past year, I’ve had countless conversations with clients and colleagues about the promise of Microsoft 365 Copilot. The excitement is real—but so are the challenges. How do we scale Copilot across departments with different needs? How do we manage costs without slowing innovation? And how do... Continue Reading →
My top cloud “trends” to look out for in 2025
Introduction I was unsure how to title this article, as I am not technically discussing trends. Still, predictions sounded far too grandiose, and the below are more personal thoughts/opinions than formal statements based on empirical data or IBM (or Microsoft) policies, etc. So, “Trends” will have to do. The Good Increased Focus on Hybrid /... Continue Reading →
Maester, Intro to Zero Trust & Conditional Access Policies & Oversharing Controls in M365
https://www.youtube.com/watch?v=B3nfKBXVjvQ In this episode of 'Cloudy with a Chance of Insights', the hosts discuss various topics related to Microsoft Cloud, including the Maester tool for security configuration, the concept of Zero Trust, oversharing controls in M365, and the importance of data security. They also highlight Microsoft's achievement of 100% coverage of the MITRE attack framework... Continue Reading →
Understanding Zero Trust in the Microsoft Cloud: Part 2
Foundational Components, Identity in a Zero-Trust model. As discussed in Part 1, Zero-Trust is a security model that relies on the key principle of Never Trust, Always Validate. This means that, in effect, you assume that your estate has already been breached, and users, devices and applications must be continuously challenged and monitored. In this... Continue Reading →
Understanding Zero Trust in the Microsoft Cloud: Part 1
Zero-Trust is a fascinating topic, and looking back at some of the statistics behind this blog and the related YouTube channel, it is not only me who is interested in this subject matter. However, I realised that most of the content I have created on this subject was aimed at people who, at a minimum, had a basic knowledge of what Zero Trust is and why it is an essential element in most organisations’ cyber security strategy. As a result, I decided to create a series of posts (and possibly a video) starting from the beginning, i.e., what zero trust is, its benefits, and some considerations.