Writing

Notes on security, infrastructure, and leadership.

Short essays for builders and technical leaders who want clarity on high-stakes systems.

RSS feed New posts whenever I have something worth sharing.

Featured Writing

A few deep dives that anchor the current body of work.

Jan 1, 2023

Why is it so slow? Troubleshooting DNS, SSH

A practical workflow for isolating slow SSH sessions by separating DNS, TCP, and authentication latency.

Networking DNS SSH Troubleshooting
Read the post

Jan 1, 2024

Private AI in Your SOC: How to Run LLMs Locally

Operating LLMs locally can help analysts summarize and triage sensitive telemetry without shipping data to third-party services.

Security Operations AI Privacy Systems
Read the post

Jan 1, 2022

Pre-commit Hooks: The Code Quality Tool You Didn't Know

Pre-commit hooks catch formatting, lint, and secret issues before code leaves a laptop, but only if they stay fast and consistent.

Developer Experience Automation Code Quality Security
Read the post

Jan 1, 2024

Why 'Zero Trust' fails without automation

Zero Trust is a systems promise, not a slogan. Without automation, the model collapses under its own operational weight.

Zero Trust Automation Security Architecture
Read the post

Jan 1, 2024

Overcoming Challenges in Upgrading to Wazuh 4.8.0

Upgrading Wazuh 4.8.0 is mostly about compatibility, index management, and keeping agents aligned with the manager and indexer.

Security Operations Wazuh Upgrade Observability
Read the post

Categories

Access Control · 1 AI · 2 Automation · 2 Code Quality · 1 Compliance · 1 Cryptography · 2 Developer Experience · 1 DNS · 1 FIPS · 1 Governance · 1 Identity · 1 Infrastructure · 1 Kubernetes · 1 Leadership · 2 MFA · 1 Networking · 2 Observability · 1 OpenSSL · 1 Operations · 3 Privacy · 2 Product · 1 Reliability · 1 Research · 1 Risk · 1 Risk Management · 1 Security · 3 Security Architecture · 2 Security Operations · 3 SSH · 1 Systems · 1 Troubleshooting · 2 Upgrade · 1 Wazuh · 1 Zero Trust · 1

Feb 5, 2025

The hidden cost of 'just one more exception'

Exceptions feel harmless in the moment. Over time they become the slow leak that drains security programs.

Risk Governance Security Operations
Read the post

Jan 22, 2025

Productizing Infrastructure: what surprised me most

Turning infrastructure into a product is less about technology and more about clarity, ownership, and trust.

Infrastructure Product Leadership
Read the post

Jan 15, 2025

Security Architecture vs Security Operations: the gap that breaks teams

Security architecture defines the promises; security operations keeps them. When those two drift, the organization pays the bill.

Security Architecture Operations Leadership
Read the post

Jan 1, 2023

When Cybersecurity Backfires

Security controls can increase risk when they create downtime, lockouts, or perverse incentives. Design needs operational reality.

Security Reliability Risk Management Operations
Read the post

Jan 1, 2023

Verifying FIPS 140-2: OpenSSL 3

FIPS compliance with OpenSSL 3 is about enabling the FIPS provider and proving it is actually in use, not just installed.

Cryptography Compliance OpenSSL FIPS
Read the post

Jan 1, 2022

AI-Encompassing Encryption / Fully Homomorphic Encryption

Fully homomorphic encryption allows computation on encrypted data, but performance and model constraints still define where it is realistic.

Cryptography Privacy AI Research
Read the post

Jan 1, 2021

Enhancing Security: A Guide to MFA

MFA is table stakes, but the details matter: phishing resistance, enrollment flow, recovery, and policy enforcement.

Identity MFA Security Access Control
Read the post

Jan 1, 2021

Troubleshooting Kubernetes Services

A stepwise method to debug broken Kubernetes Services by validating selectors, endpoints, DNS, and kube-proxy routing.

Kubernetes Networking Troubleshooting Operations
Read the post