2026
Specification-First AI Development
How formal models and machine-checkable specifications make AI write better code, and what happens when the proofs have gaps.
2025
OODA Loops for Incident Response
How John Boyd’s military decision-making framework can transform your security team’s incident response workflows.
Formal Methods for Binary Analysis
A three-part series on symbolic execution, SMT solving, and abstract interpretation for reverse engineering.
Hybrid Identity Compromise Recovery
A comprehensive playbook for evicting threat actors from hybrid identity environments with modern commands and hardening recommendations.
Information Asymmetry in Cybersecurity
Why the battle between attackers and defenders isn’t about technology, it’s about who knows what, and when.
Cloud Identity Hardening
Best practices for securing cloud identity infrastructure.