Category: Perspective

Commentary on cybersecurity culture, industry practices, and professional insights drawn from 25+ years in InfoSec. Challenging conventional thinking about security strategy, organizational behavior, and the evolving cybersecurity landscape.

A well-lit conference room during an active cybersecurity incident response, with an incident timeline open on a laptop in the foreground and executives and security staff collaborating at a whiteboard in the background.

Week 12: Incident Response Is Half Politics

Most incident response plans assume clean timelines and clear answers. Real incidents are messier—shaped by uncertainty, executive pressure, incomplete data, and human dynamics that matter as much as technical skill.

Read More »
An abstract illustration of tangled digital identity connections linking user accounts, service accounts, API keys, and cloud tokens across cloud, SaaS, and on-prem systems, suggesting identity sprawl and hidden risk.

Week 5: The Identity Sprawl Problem

Identity is the real perimeter in modern environments. As service accounts, API keys, and federated access sprawl across SaaS, cloud, and APIs, organizations lose visibility, control, and the ability to enforce least privilege—turning identity debt into one of the most dangerous and persistent cyber risks.

Read More »

Why Chat-Based AI Tools Fail in Operational Security: Building Capability vs. Productivity

Most cybersecurity vendors now claim “AI integration,” but few can explain what their AI actually does or how it makes operational decisions. While chat-based AI tools like Microsoft Copilot excel at individual productivity tasks, they introduce dangerous variability when applied to operational security work that requires consistency, auditability, and institutional

Read More »

Join our newsletter to stay updated

Scroll to Top