all_articles
2025-08-29
intelligence_systems
It's important that we maintain access to fact-based, diverse perspectives on global and local issues that affect us. I've created an app that curates information from a wide range of reputable sources and creates custom daily reporting for me on events and trends that I care about.
ai_insight.md
2025-08-18
ai_vulnerability_management
How artificial intelligence transforms vulnerability management from static data points into dynamic, context-aware intelligence that dramatically improves both accuracy and operational efficiency.
2025-08-15
vulnerability_management
CVEs get a lot of attention, but they are at the tip of a pyramid when it comes to vulnerability management. This article contextualizes CVE findings to show teams how to build a solid foundation for effective vulnerability management.
2025-08-04
digital_transformation
A new type of engineer is emerging - the "transformation engineer." Understanding and empowering them may be crucial for competitive advantage in the tumultuous times ahead.
2025-07-18
compliance_automation
Why most compliance automation fails at the engineering reality check, and how to build validation that actually works using unit and function tests.
2025-05-27
opa_policy
How Open Policy Agent (OPA) transforms compliance from a cost center into a competitive advantage for cloud service providers.
2025-05-14
sbom
Discover how Software Bills of Materials (SBOMs) are transforming cloud security and compliance practices.
2025-04-28
devsecops
Exploring why hardened components in your CI/CD pipeline are essential for security, from DIY approaches to vendor solutions.
2025-04-18
cybersec_strategy
Exploring how complexity itself has emerged as a meta-risk that overshadows conventional cybersecurity threats.
2025-04-10
container_security
Learn how organizations can define and track ephemeral technology components in containerized environments.
2025-03-25
cybersecurity
Learn how to ethically assess the thoroughness of public asset inventory practices using free, open-source tools like Nmap, Masscan, Amass, and Shodan.
2025-03-13
artificial_intelligence
Learn how to unlock the power of AI on your ordinary laptop - no subscriptions, no privacy concerns, and no fancy hardware required.
2025-02-25
cloud_security
How to implement a comprehensive vulnerability management workflow in AWS for under $50,000
2025-02-01
compliance_as_code
How to implement compliance-as-code in AWS using GitOps and automated security control validation
2025-01-19
vpn_analysis
Going down the rabbit hole while attempting to uninstall ProtonVPN - persistence mechanisms and security implications