Practical Security Analysis from the Field

Deep examinations of industry incidents, vendor risk, and operational security decisions – no certifications required, just 25+ years of experience.

An abstract illustration of tangled digital identity connections linking user accounts, service accounts, API keys, and cloud tokens across cloud, SaaS, and on-prem systems, suggesting identity sprawl and hidden risk.
Week 5: The Identity Sprawl Problem

Identity is the real perimeter in modern environments. As service accounts, API keys, and federated access sprawl across SaaS, cloud, and APIs, organizations lose visibility, control, and the ability to enforce least privilege—turning identity debt into one of the most dangerous and persistent cyber risks.

Continue Reading
Why Chat-Based AI Tools Fail in Operational Security: Building Capability vs. Productivity

Most cybersecurity vendors now claim “AI integration,” but few can explain what their AI actually does or how it makes operational decisions. While chat-based AI tools like Microsoft Copilot excel at individual productivity tasks, they introduce dangerous variability when applied to operational security work that requires consistency, auditability, and institutional knowledge.
This analysis examines why conversational AI fails in SOC analysis, GRC assessments, and compliance work—where a single word in a prompt can trigger vastly different risk classifications and operational outcomes. The core issue isn’t the technology itself, but the structural mismatch between tools designed for exploratory work and processes that demand repeatable, auditable results.
Drawing from real-world implementation experience, this piece explores the hidden risks of context pollution, judgment variance, and governance gaps in AI-powered security operations. It presents a practical alternative: modeling AI as stateless services that encode institutional expertise while eliminating the variability that makes chat-based approaches unsuitable for regulated environments. Essential reading for security leaders navigating AI adoption without compromising operational integrity.

Continue Reading
A security professional stands facing a large, partially completed infrastructure diagram showing servers, cloud systems, identities, and data flows, with some connections clearly mapped and others fading into shadow to represent unknown or undocumented assets.
Week 2: Understanding Your Environment Before You Try to Secure It

You can’t secure what you don’t understand. Before threat hunting, tooling, or remediation, security teams must confront the messy reality of undocumented systems, identity sprawl, data drift, and technical debt. This piece explains why environment discovery is foundational security work—and why skipping it undermines everything that follows.

Continue Reading
An abstract illustration of tangled digital identity connections linking user accounts, service accounts, API keys, and cloud tokens across cloud, SaaS, and on-prem systems, suggesting identity sprawl and hidden risk.
Week 5: The Identity Sprawl Problem

Identity is the real perimeter in modern environments. As service accounts, API keys, and federated access sprawl across SaaS, cloud, and APIs, organizations lose visibility, control, and the ability to enforce least privilege—turning identity debt into one of the most dangerous and persistent cyber risks.

Continue Reading
Why Chat-Based AI Tools Fail in Operational Security: Building Capability vs. Productivity

Most cybersecurity vendors now claim “AI integration,” but few can explain what their AI actually does or how it makes operational decisions. While chat-based AI tools like Microsoft Copilot excel at individual productivity tasks, they introduce dangerous variability when applied to operational security work that requires consistency, auditability, and institutional knowledge.
This analysis examines why conversational AI fails in SOC analysis, GRC assessments, and compliance work—where a single word in a prompt can trigger vastly different risk classifications and operational outcomes. The core issue isn’t the technology itself, but the structural mismatch between tools designed for exploratory work and processes that demand repeatable, auditable results.
Drawing from real-world implementation experience, this piece explores the hidden risks of context pollution, judgment variance, and governance gaps in AI-powered security operations. It presents a practical alternative: modeling AI as stateless services that encode institutional expertise while eliminating the variability that makes chat-based approaches unsuitable for regulated environments. Essential reading for security leaders navigating AI adoption without compromising operational integrity.

Continue Reading
A security professional stands facing a large, partially completed infrastructure diagram showing servers, cloud systems, identities, and data flows, with some connections clearly mapped and others fading into shadow to represent unknown or undocumented assets.
Week 2: Understanding Your Environment Before You Try to Secure It

You can’t secure what you don’t understand. Before threat hunting, tooling, or remediation, security teams must confront the messy reality of undocumented systems, identity sprawl, data drift, and technical debt. This piece explains why environment discovery is foundational security work—and why skipping it undermines everything that follows.

Continue Reading
Week 5: The Identity Sprawl Problem

Identity is the real perimeter in modern environments. As service accounts, API keys, and federated access sprawl across SaaS, cloud, and APIs, organizations lose visibility, control, and the ability to enforce least privilege—turning identity debt into one of the most dangerous and persistent cyber risks.

Continue Reading
Why Chat-Based AI Tools Fail in Operational Security: Building Capability vs. Productivity

Most cybersecurity vendors now claim “AI integration,” but few can explain what their AI actually does or how it makes operational decisions. While chat-based AI tools like Microsoft Copilot excel at individual productivity tasks, they introduce dangerous variability when applied to operational security work that requires consistency, auditability, and institutional knowledge.
This analysis examines why conversational AI fails in SOC analysis, GRC assessments, and compliance work—where a single word in a prompt can trigger vastly different risk classifications and operational outcomes. The core issue isn’t the technology itself, but the structural mismatch between tools designed for exploratory work and processes that demand repeatable, auditable results.
Drawing from real-world implementation experience, this piece explores the hidden risks of context pollution, judgment variance, and governance gaps in AI-powered security operations. It presents a practical alternative: modeling AI as stateless services that encode institutional expertise while eliminating the variability that makes chat-based approaches unsuitable for regulated environments. Essential reading for security leaders navigating AI adoption without compromising operational integrity.

Continue Reading
Week 2: Understanding Your Environment Before You Try to Secure It

You can’t secure what you don’t understand. Before threat hunting, tooling, or remediation, security teams must confront the messy reality of undocumented systems, identity sprawl, data drift, and technical debt. This piece explains why environment discovery is foundational security work—and why skipping it undermines everything that follows.

Continue Reading
Scroll to Top