Cybersecurity
Modern threat models, infosec history, zero trust, and Layer 8 security breakdowns.
-
When Passwords Were Enough: A Brief History of Early IT Security
There was a time, not particularly long ago, when securing a computer required little more than a locked door and perhaps a trusted guard at the front desk. The machines were physically imposing, access was inherently local, and threats were tangible rather than virtual. If someone couldn’t enter the room, they simply couldn’t access your…
-
Layer 8: Where Technology Meets Humanity (and Sometimes Breaks Because of It)
There’s a saying in cybersecurity circles — part-joke, part-axiom — that the real problem is Layer 8. For those unfamiliar with the OSI model, it stops at Layer 7. But Layer 8? That’s us. The user. The human. The one clicking on phishing links, misconfiguring access controls, or forwarding credentials in Slack. Layer 8 isn’t…
Cloud & Infrastructure
Covers vendors (AWS, GCP, Azure), cloud architecture, DevOps, identity, and operations at scale.
Human Layer
Where psychology, behavior, and security intersect. Exploring the messiest layer — the human one.
Tech Culture & Commentary
Rants, reflections, and reality checks on how tech shapes our lives and work.
Essays & Reflections
Philosophical, theological, and personal essays for deeper thought and slower reads.
News & Reactions
Timely posts on industry events, news analysis, or breaking tech topics.
Media & Reviews
Book reviews, film reactions, and cultural reflections on narratives shaping our digital age.