M.ALRASHID

SECURITY_LOG

Notebook

Technical deep-dives, war stories, and research notes from the intersection of infrastructure engineering and adversarial security.

4 PUBLISHED_ENTRIES

Featured_Intelligence

ARCHITECTUREIOTZERO-TRUSTOctober 24, 20248 min read

Zero Trust Architecture in Industrial IoT

How Zero Trust Architecture reshapes the security posture of industrial environments by eliminating implicit trust at every layer of the stack.

READ_FILE →
AI SECURITYARCHITECTURE

Securing AI Agents and the Dangers of OpenClaw

Autonomous AI agents are being deployed with tool access, memory, and decision-making authority. OpenClaw and similar frameworks make this dangerously easy — here's why the security model is broken.

May 10, 202511 min
READ_FILE →
RED TEAMIOT

CAN Bus Hacking: Attacking and Defending the Automotive Backbone

A deep dive into the CAN bus protocol — how it works, why it's vulnerable, and what happens when attackers gain access to the backbone of every modern vehicle.

April 12, 202512 min
READ_FILE →
NETWORKINGARCHITECTURE

Zero Trust Networking and SASE: Collapsing the Perimeter

Traditional VPNs and perimeter firewalls are failing. SASE and zero trust networking merge identity, policy, and connectivity into a single fabric — here's how the architecture actually works.

March 18, 202510 min
READ_FILE →