Wired to break things. Built to secure them.

Honest takes on AI, security, and automation from someone who still gets excited about this stuff. No vendor spin, no fluff. Just the notes of someone who hasn't gotten bored yet.

MCP Servers Are a Shadow IT Problem You Don't Know You Have Yet

Model Context Protocol lets AI assistants execute code against your databases, file systems, and APIs. Your developers are already using it. Your security tools can't see it.

Navigating Security in the Generative AI Era

As I emerge from my deep dive into Generative AI, let's explore the security implications and practical steps to protect yourself in this evolving landscape.

Raspberry Pi Configuration Notes

Create an Image for rpi use disk management to remove any partitions on t...

What Motivates Attackers to Come After You?

In order to strengthen the security for your organization you need to underst...

Web Account Securtiy Hygene Tips

As we prepare to close out this year and plan to start the year fresh, consid...

MFA is Not The Holy Grail of Security?

While Multi Factor Authentication (MFA) does provide greater security than us...

How to Protect Yourself From Credential Stuffing Attacks

If you’ve heard it once you’ve heard it a million times, “don’t use the same ...