Do you own a robot vacuum cleaner? Good. Then you’ll understand my take on Anthropic’s “Project Glasswing.” In short, Anthropic has created a new LLM […]
Don’t buy AI. (Redesign your workflows.)
Every day we read a story on LinkedIn about how someone built an app using an AI. The impression given is that in the future […]
Making AI Trustworthy in Cybersecurity: Why Hybrid Determinism Wins
I came across an interesting Norwegian startup Reliable AI this week working on what they call “hallucination-free AI.” Their approach is simple. Remove the final […]
From Vibe Coding to Buddy-Coding: A Practical Model for Staying in Control of AI-Assisted Development
“Never outsource understanding to prompts. Use AI to sharpen your thinking.” There’s a growing narrative in dev: “Describe the app. Let AI generate the code. Ship […]
Are Security Certifications Still Relevant in the Age of AI?
I recently passed my CISSP exam (Certified Information Systems Security Professional). Over the past 15 months, I’ve completed CISM and CRISC from ISACA. In my […]
Designing a Privacy-First Personal Architecture (Without Ditching Your iPhone)
Your phone gets stolen. Within minutes, the thief has access to your email, your password resets, and your digital identity. This happens because most people […]
From Factory Relocation to AI Hype: Why Infrastructure Still Wins
In 1994, while finishing my last year at Penn State, I learned that a neighboring consultant was tasked with dismantling the massive Corning glass plant […]
Why security logs don’t behave like language (and never will.)
Large language models (LLMs) excel at parsing and generating human language. Security logs, however, are not language; they’re behavioral exhaust, a compact record of machine events. […]
Alert fatigue isn’t a people problem: it’s a design failure
An analyst receives a ‘Suspicious PowerShell Execution’ alert. The SIEM shows only the command line, no context about the host or recent activity. With PyLog, […]
The Future of AI Is Smaller, Local, and Domain-Specific
AI-enabled security tools are creating noise instead of actionable insight from security logs. Security professionals struggle with how to prioritize their time fixing the most […]
I’m never going to experience AGI in my lifetime
You might have heard that artificial general intelligence (AGI) will arrive by Christmas, or at least by 2030, but I have a very different opinion. […]
Welcome to the Internet: 1990
In the spring of 1990 I was admitted to the Bowling Green State University. I arrived in Bowling Green, Ohio, in August of that year. […]
Becoming a data-driven enterprise: a federated data ecosystem(Part 3 of 3)
In my last article, Becoming a data-driven enterprise: From Data Warehouse to the Data Lake, I discussed the evolution of BI tools and data lakes from […]
Becoming a data-driven enterprise: From Data Warehouse to the Data Lake (Part 2 of 3)
Photo by Quang Nguyen Vinh This is the second article of three that discusses what a data strategy is, where companies have gone wrong building […]
Becoming a data-driven enterprise: Data strategy (Part 1 of 3)
This is the first article of three where I discuss what a data strategy is, where companies have gone wrong building data platforms, and the […]
How to Conduct a Cybersecurity Risk Assessment
This article provides a step-by-step guide for conducting a cybersecurity risk assessment to identify and prioritise potential threats to your business. What I have learned […]