When Your Management Plane Becomes the Attack Surface
How the March 2026 Stryker incident shows that identity and admin control planes, not malware, are now the primary enterprise attack surface.
Notes on security, AI, and whatever I'm currently overthinking.
How the March 2026 Stryker incident shows that identity and admin control planes, not malware, are now the primary enterprise attack surface.
A simple baseline of Microsoft 365 security controls that reduce common breach paths like business email compromise and identity takeover.
A look at the Western Australia Auditor General findings and what they reveal about how Microsoft 365 breaches actually happen.
A technical breakdown of WebAuthn registration and authentication flows, plus a practical look at where passkeys do not solve every security problem.
Why passkeys are the first meaningful redesign of authentication in decades. A practical, security-first look at phishing resistance, WebAuthn, and enterprise reality.
Practical controls for enforcing Zero Trust in SaaS and AI environments including in-browser DLP, OAuth governance, and session telemetry.
Most modern SaaS and AI breaches begin in the browser. Token theft, OAuth abuse, and generative AI workflows have shifted the Zero Trust perimeter.
How to securely run GitHub Copilot CLI and Claude Code on developer machines. Prevent prompt injection, repository poisoning, and over-scoped tokens using deterministic controls.