Conversations with a Ghost | A True Story of the Architects of the Digital Unknown This is a true story based upon my solo research project, The Storm Project | AI, Cybersecurity, Quantum, and the Future of Intelligence. Some might refer to it as part of an ethnography, a […]
How Algorithmic Mislabeling Hides Helpful Content (Part 1 | Yandex)
Low-Value? High Stakes | How Algorithms Hide Helpful Content and What We Can Do About It So there I was, sipping coffee and minding my own high-value business, when Yandex decided to let me know that my comprehensive, well-researched article on protecting your identity after a data breach was […]
What You Need to Know to Protect Your Web Hosting Environment
How a Former CISO Uncovered Systemic Hosting Failures and What You Need to Know to Protect Your Web Hosting Environment Ever wonder if your web hosting is operating as designed? Are your metrics lagging and is your site rank dropping? It might not be your product or your website. […]
Swatting as a Weapon | A Preemptive Strategy to Stop Escalation
Preventing Swatting Before It Becomes a Crisis In recent weeks, there has been a noticeable increase in swatting incidents targeting conservative journalists and influencers. This is a dangerous trend, one that puts lives at risk and could easily spiral into a broader crisis if left unchecked. That’s why we […]
The Trunk Monkey Effect | Why Suppressing the Right People Backfires
Meet the Trunk Monkey Every organization has its high-profile leaders, its visible innovators, and its front-facing experts. But in the background, often underestimated, overlooked, or even outright suppressed, are the true force multipliers. These are the people who see the threats before they happen, fix the unfixable, and step […]
The Unspoken Cost of Integrity | Why Some of the Best Minds Get Silenced
The Silent War on High-Integrity Professionals Some battles aren’t fought in the open. There are no loud accusations, no public confrontations. It’s just a slow, creeping suppression that operates in the shadows. The most dangerous form of professional blackballing isn’t overt. It’s silent, strategic, and systemic. This silent blackballing […]
Inside the Invisible Battlefield | Why Hunter Storm Created a Cybersecurity Learning Series
Inside the Invisible Battlefield | Why Cybersecurity Veteran Hunter Storm Created a Cybersecurity Learning Series to Protect Everyday People When people hear about hacks, cybersecurity incidents, or data breaches, the majority get nervous. Most people don’t have access to top-tier security experts. They don’t have someone who can break […]




