Thoughts, ideas and code.

Don’t limit yourself. Many people limit themselves to what they think they can do. You can go as far as your mind lets you. What you believe, remember, you can achieve.

MCP Servers Are a Shadow IT Problem You Don't Know You Have Yet

Model Context Protocol lets AI assistants execute code against your databases, file systems, and APIs. Your developers are already using it. Your security tools can't see it.

Navigating Security in the Generative AI Era

As I emerge from my deep dive into Generative AI, let's explore the security implications and practical steps to protect yourself in this evolving landscape.

Raspberry Pi Configuration Notes

Create an Image for rpi use disk management to remove any partitions on t...

What Motivates Attackers to Come After You?

In order to strengthen the security for your organization you need to underst...

Web Account Securtiy Hygene Tips

As we prepare to close out this year and plan to start the year fresh, consid...

MFA is Not The Holy Grail of Security?

While Multi Factor Authentication (MFA) does provide greater security than us...

How to Protect Yourself From Credential Stuffing Attacks

If you’ve heard it once you’ve heard it a million times, “don’t use the same ...