Skip to main content

2026

Specification-First AI Development

How formal models and machine-checkable specifications make AI write better code, and what happens when the proofs have gaps.

2025

OODA Loops for Incident Response

How John Boyd’s military decision-making framework can transform your security team’s incident response workflows.

Formal Methods for Binary Analysis

A three-part series on symbolic execution, SMT solving, and abstract interpretation for reverse engineering.

Hybrid Identity Compromise Recovery

A comprehensive playbook for evicting threat actors from hybrid identity environments with modern commands and hardening recommendations.

Information Asymmetry in Cybersecurity

Why the battle between attackers and defenders isn’t about technology, it’s about who knows what, and when.

Cloud Identity Hardening

Best practices for securing cloud identity infrastructure.