SECURITY_LOG
Notebook
Technical deep-dives, war stories, and research notes from the intersection of infrastructure engineering and adversarial security.
4 PUBLISHED_ENTRIES
Featured_Intelligence
Zero Trust Architecture in Industrial IoT
How Zero Trust Architecture reshapes the security posture of industrial environments by eliminating implicit trust at every layer of the stack.
READ_FILE →Securing AI Agents and the Dangers of OpenClaw
Autonomous AI agents are being deployed with tool access, memory, and decision-making authority. OpenClaw and similar frameworks make this dangerously easy — here's why the security model is broken.
CAN Bus Hacking: Attacking and Defending the Automotive Backbone
A deep dive into the CAN bus protocol — how it works, why it's vulnerable, and what happens when attackers gain access to the backbone of every modern vehicle.
Zero Trust Networking and SASE: Collapsing the Perimeter
Traditional VPNs and perimeter firewalls are failing. SASE and zero trust networking merge identity, policy, and connectivity into a single fabric — here's how the architecture actually works.