I Spy. . . a Fly? Imagine swatting what you think is a fly, only to be threatened with FAA violations. Now imagine that fly was never a fly at all. Remember that game we played as children, “I Spy?” It went something like, “I spy with my little eye, […]
Conversations with a Ghost | People in High Stakes Roles
Conversations with a Ghost | A True Story of the Architects of the Digital Unknown This is a true story based upon my work in artificial intelligence (AI) and cybersecurity research. Names and roles have been generalized to protect individuals and systems. It is written for the ones who stayed […]
What You Need to Know to Protect Your Web Hosting Environment
How a Former CISO Uncovered Systemic Hosting Failures and What You Need to Know to Protect Your Web Hosting Environment Ever wonder if your web hosting is operating as designed? Are your metrics lagging and is your site rank dropping? It might not be your product or your website. Instead, […]
Swatting as a Weapon | A Preemptive Strategy to Stop Escalation
Preventing Swatting Before It Becomes a Crisis In recent weeks, there has been a noticeable increase in swatting incidents targeting conservative journalists and influencers. This is a dangerous trend, one that puts lives at risk and could easily spiral into a broader crisis if left unchecked. That’s why we need […]
The Trunk Monkey Effect | Why Suppressing the Right People Backfires
Meet the Trunk Monkey Every organization has its high-profile leaders, its visible innovators, and its front-facing experts. But in the background, often underestimated, overlooked, or even outright suppressed, are the true force multipliers. These are the people who see the threats before they happen, fix the unfixable, and step in […]