Welcome to my blog, where I invite you to join me on an exhilarating journey through life’s ups and downs, all while discovering the beauty of the world around us. My name is Ajith, and I am a passionate explorer, seeker of knowledge, and an advocate of personal growth. Through this blog, I aim to share my experiences, reflections, and insights, hoping to inspire and connect with like-minded individuals who also navigate their unique paths in this vast universe.

  • Why User Defined Permissions (UDP) for content and Encrypt-Only Email Behave Differently Part 1
    This blog is about my understanding how Microsoft Purview sensitivity label User Defined Permissions (UDP) for documents, and Encrypt Only behave under the hood of Azure Rights Management Service (Azure RMS) and how protection boundaries are enforced. Here I am trying to explain This analysis are based on Microsoft’s documented enforcement model. Scenario 1 –…
  • Why User Defined Permissions (UDP) for content and Encrypt-Only Email Behave Differently Part 2
    We discussed about Scenario 1 and Scenario 2 in part 1 of this blog. Here we are going to discuss on Scenario 3 where User A (Tenant A) applies a User‑Defined Permissions (UDP) label to a document Grants Owner permission to User X (Tenant B), User X forwards the document to User Y (Tenant C)…
  • How to Build an Effective Insider Threat Program (Part 2)
    In Part 1 of the blog, we explored the dynamics of insider threats and the importance of an Insider Threat Program (ITP). In Part 2, we’ll delve into practical strategies and resources to effectively build and implement an ITP for organization. In this part of the blog, we will explore strategies to build an effective…
  • How to Build an Effective Insider Threat Program (Part 1)
    In 2022, I participated in an Insider Threat Audit Program for a prominent financial institution. The primary objective of this initiative was to assess the effectiveness of the Insider Threat Program (ITP), established in 2019. Throughout our research into the functioning of insider threat programs, we identified several practical strategies that organizations can adopt when…
  • Cybersecurity for SMEs: Where to Spend Your First Dollar
    Small and medium-sized enterprises (SMEs) are no longer considered “too small to target.” They are often easier marks: limited budgets, lean IT teams, and a strong reliance on cloud services make them especially appealing to attackers. A question I frequently hear from SME leaders is straightforward: “If I only have the budget for one investment,…
  • Changing Microsoft Purview Information Protection (MPIP) Sensitivity labels in PDF (Windows)
    There are several excellent documents about using sensitivity labels in PDF documents. However, when I tested this on Microsoft Windows machines, I encountered several undocumented stoppers, which made me write this. I hope it is helpful for others or even a reference for me in the future. Also, this write-up is more focused on changing…