I Spy. . . a Fly? Imagine swatting what you think is a fly, only to be threatened with FAA violations. Now imagine that fly was not a fly at all. Could it be a biomimetic insect drone instead? Remember that game we played as children, “I Spy?” It went […]
Conversations with a Ghost | People in High Stakes Roles
Conversations with a Ghost | A True Story of the Architects of the Digital Unknown This is a true story based upon my work in artificial intelligence (AI) and cybersecurity research. Names and roles have been generalized to protect individuals and systems. It is written for the ones who stayed […]
How Algorithmic Mislabeling Hides Helpful Content (Part 1 | Yandex)
Low-Value? High Stakes | How Algorithms Hide Helpful Content and What We Can Do About It So there I was, sipping coffee and minding my own high-value business, when Yandex decided to let me know that my comprehensive, well-researched article on protecting your identity after a data breach was officially […]
What You Need to Know to Protect Your Web Hosting Environment
How a Former CISO Uncovered Systemic Hosting Failures and What You Need to Know to Protect Your Web Hosting Environment Ever wonder if your web hosting is operating as designed? Are your metrics lagging and is your site rank dropping? It might not be your product or your website. Instead, […]
Swatting as a Weapon | A Preemptive Strategy to Stop Escalation
Preventing Swatting Before It Becomes a Crisis In recent weeks, there has been a noticeable increase in swatting incidents targeting conservative journalists and influencers. This is a dangerous trend, one that puts lives at risk and could easily spiral into a broader crisis if left unchecked. That’s why we need […]




