Browse Articles by Category

Cybersecurity

Modern threat models, infosec history, zero trust, and Layer 8 security breakdowns.

  • When Passwords Were Enough: A Brief History of Early IT Security

    There was a time, not particularly long ago, when securing a computer required little more than a locked door and perhaps a trusted guard at the front desk. The machines were physically imposing, access was inherently local, and threats were tangible rather than virtual. If someone couldn’t enter the room, they simply couldn’t access your…

  • Layer 8: Where Technology Meets Humanity (and Sometimes Breaks Because of It)

    There’s a saying in cybersecurity circles — part-joke, part-axiom — that the real problem is Layer 8. For those unfamiliar with the OSI model, it stops at Layer 7. But Layer 8? That’s us. The user. The human. The one clicking on phishing links, misconfiguring access controls, or forwarding credentials in Slack. Layer 8 isn’t…

Cloud & Infrastructure

Covers vendors (AWS, GCP, Azure), cloud architecture, DevOps, identity, and operations at scale.

Human Layer

Where psychology, behavior, and security intersect. Exploring the messiest layer — the human one.

Tech Culture & Commentary

Rants, reflections, and reality checks on how tech shapes our lives and work.

Essays & Reflections

Philosophical, theological, and personal essays for deeper thought and slower reads.

News & Reactions

Timely posts on industry events, news analysis, or breaking tech topics.

Media & Reviews

Book reviews, film reactions, and cultural reflections on narratives shaping our digital age.