Layer 8: Where Technology Meets Humanity (and Sometimes Breaks Because of It)

There’s a saying in cybersecurity circles — part-joke, part-axiom — that the real problem is Layer 8. For those unfamiliar with the OSI model, it stops at Layer 7. But Layer 8? That’s us. The user. The human. The one clicking on phishing links, misconfiguring access controls, or forwarding credentials in Slack.

Layer 8 isn’t just a punchline. It’s the lens through which I process most of what happens in tech — and frankly, the world.

This site is something of an experiment. A space to reflect not just on cloud security and threat models (though those will absolutely show up), but on the deeper forces beneath the surface: trust, risk, incentives, and the ever-complicated human factor.

I’ve spent the better part of two decades in tech, much of it in security and support roles. I hold certifications, I’ve worked at scale, and I’ve learned — often painfully — that most failures aren’t because of what systems can’t do, but what people assume they will.


What You Can Expect Here:

  • Thoughtful, sometimes uncomfortable takes on cybersecurity and cloud architecture
  • Commentary on technology’s intersection with society, and where we’re headed
  • Occasional dives into books, media, and public discourse — especially where nuance is in short supply

This won’t be a place for hot takes or clickbait. I’m more interested in what’s real, what’s observable, and what’s being overlooked.

If that sounds like your lane, I’d love to have you along.

👉 Subscribe here to receive future posts directly.

About the Author
I’m a security professional by trade, a writer by nature, and a student of Layer 8 — that unpredictable space where systems and people collide. This blog is where I wrestle with what we build, what we break, and what that says about us.

Leave a Comment

Your email address will not be published. Required fields are marked *