all_articles
2026-03-23
FedRAMP 20x
Agentic systems can easily become simulacra. Without governance anchored in genuine human intent, we get organizations that are perfectly, continuously, autonomously convinced they’re secure... until reality proves otherwise.
2026-03-05
FedRAMP 20x
FedRAMP 20x isn't an overhaul of compliance. It is an extension of engineering best practices into compliance. In other words, compliance is now a function of Site Reliability Engineering.
2026-02-11
self-reflection
Attempting to capture what writing really means to me.
2026-02-08
cybersec_strategy
The mathematics of thresholds maps directly onto cybersecurity. Dynamical systems theory provides the vocabulary to describe how security operations actually works, and how to measure whether it’s working.
2026-01-13
FedRAMP 20x
Series: Converging on Trust • Part 3
Systems that optimize on engagement diverge against trust. Exploring the security risks of engagement-optimization in generative AI platforms used by government.
2025-12-18
FedRAMP 20x
Series: Converging on Trust • Part 2
How public and private sector organizations with different incentive structures can converge on shared security goals through measurable trust.
2025-12-11
compliance_automation
How a shift in perspective opens up automated validation and reporting, even for "non-technical" controls, and why this matters for modern compliance.
2025-11-06
risk_assessment
What if you could assess risk across any Cloud Service Provider in 15 minutes with nothing but a laptop, and repeat it continuously?
2025-10-22
Cybersecurity
There are many great cybersecurity tools on the market, but buying good tools won't automatically give you good security. Just as you can't buy a hammer and expect it to build a house, tools need capable operators in order for them to be effective.
2025-10-08
FedRAMP 20x
Series: Converging on Trust • Part 1
From ancient Greek navigators to predictive security: how feedback loops and self-adaptation are transforming government compliance.
2025-09-11
military_values
A reflection on military service, integrity, and the implications of political decisions affecting those who have served.
2025-08-29
intelligence_systems
It's important that we maintain access to fact-based, diverse perspectives on global and local issues that affect us. I've created an app that curates information from a wide range of reputable sources and creates custom daily reporting for me on events and trends that I care about.
ai_insight.md
2025-08-18
ai_vulnerability_management
Series: Beyond the CVE • Part 2
How artificial intelligence transforms vulnerability management from static data points into dynamic, context-aware intelligence that dramatically improves both accuracy and operational efficiency.
2025-08-15
vulnerability_management
Series: Beyond the CVE • Part 1
CVEs get a lot of attention, but they are at the tip of a pyramid when it comes to vulnerability management. This article contextualizes CVE findings to show teams how to build a solid foundation for effective vulnerability management.
2025-08-04
digital_transformation
A new type of engineer is emerging - the "transformation engineer." Understanding and empowering them may be crucial for competitive advantage in the tumultuous times ahead.
2025-07-18
compliance_automation
Why most compliance automation fails at the engineering reality check, and how to build validation that actually works using unit and function tests.
2025-05-27
opa_policy
How Open Policy Agent (OPA) transforms compliance from a cost center into a competitive advantage for cloud service providers.
2025-05-14
sbom
Discover how Software Bills of Materials (SBOMs) are transforming cloud security and compliance practices.
2025-04-28
devsecops
Exploring why hardened components in your CI/CD pipeline are essential for security, from DIY approaches to vendor solutions.
2025-04-18
cybersec_strategy
Exploring how complexity itself has emerged as a meta-risk that overshadows conventional cybersecurity threats.
2025-04-10
container_security
Series: See What Attackers See • Part 2
Learn how organizations can define and track ephemeral technology components in containerized environments.
2025-03-25
cybersecurity
Series: See What Attackers See • Part 1
Learn how to ethically assess the thoroughness of public asset inventory practices using free, open-source tools like Nmap, Masscan, Amass, and Shodan.
2025-03-13
artificial_intelligence
Learn how to unlock the power of AI on your ordinary laptop - no subscriptions, no privacy concerns, and no fancy hardware required.
2025-02-25
cloud_security
How to implement a comprehensive vulnerability management workflow in AWS for under $50,000
2025-02-01
compliance_as_code
How to implement compliance-as-code in AWS using GitOps and automated security control validation
2025-01-19
vpn_analysis
Going down the rabbit hole while attempting to uninstall ProtonVPN - persistence mechanisms and security implications