Writing and thinking about information security. Helping organizations build resilient security postures through assessment, architecture, and compliance.
Comprehensive security solutions tailored to your organization.
Know where you stand before an attacker shows you. Our assessments go beyond automated scans to uncover real risks in your environment.
Build security into your infrastructure from the ground up. We design network architectures that are secure by default and resilient by design.
Compliance does not have to be painful. We help you meet regulatory requirements efficiently while building a governance program that adds real value.
Control who has access to what and when. We help you implement IAM frameworks that balance security with usability.
Thinking out loud about security, risk, and what it means to protect systems.
Last month, researchers flagged 73 malicious VS Code extensions delivering GlassWorm v2 malware — backdoors that spread across IDEs and steal credentials from developers who thought they were installing productivity tools. The unsettling part: these extensions had been sitting in the marketplace since December 2025, building reputation before the malicious update dropped. Then came the […]
The good news: small practices don’t need to outrun the bear. They just need to be harder to penetrate than the practice down the street. Attackers are opportunistic. Most ransomware groups run automated scanning that flags easy targets — unpatched VPNs, legacy protocols left exposed, admin accounts without MFA. Solid MFA, current patches, and offline […]
Most organizations are deploying AI faster than they’re building security controls for it. The result is a growing gap between what AI can do in your environment and what your security team can actually see or defend. AI security governance is about closing that gap — establishing a structured set of policies, controls, and oversight […]
Ready to get serious about security? Tell me about your situation.