Your phone gets stolen. Within minutes, the thief has access to your email, your password resets, and your digital identity. This happens because most people […]
From Factory Relocation to AI Hype: Why Infrastructure Still Wins
In 1994, while finishing my last year at Penn State, I learned that a neighboring consultant was tasked with dismantling the massive Corning glass plant […]
Why security logs don’t behave like language (and never will.)
Large language models (LLMs) excel at parsing and generating human language. Security logs, however, are not language; they’re behavioral exhaust, a compact record of machine events. […]
Alert fatigue isn’t a people problem: it’s a design failure
An analyst receives a ‘Suspicious PowerShell Execution’ alert. The SIEM shows only the command line, no context about the host or recent activity. With PyLog, […]
The Future of AI Is Smaller, Local, and Domain-Specific
AI-enabled security tools are creating noise instead of actionable insight from security logs. Security professionals struggle with how to prioritize their time fixing the most […]
I’m never going to experience AGI in my lifetime
You might have heard that artificial general intelligence (AGI) will arrive by Christmas, or at least by 2030, but I have a very different opinion. […]
Welcome to the Internet: 1990
In the spring of 1990 I was admitted to the Bowling Green State University. I arrived in Bowling Green, Ohio, in August of that year. […]
Becoming a data-driven enterprise: a federated data ecosystem(Part 3 of 3)
In my last article, Becoming a data-driven enterprise: From Data Warehouse to the Data Lake, I discussed the evolution of BI tools and data lakes from […]
Becoming a data-driven enterprise: From Data Warehouse to the Data Lake (Part 2 of 3)
Photo by Quang Nguyen Vinh This is the second article of three that discusses what a data strategy is, where companies have gone wrong building […]
Becoming a data-driven enterprise: Data strategy (Part 1 of 3)
This is the first article of three where I discuss what a data strategy is, where companies have gone wrong building data platforms, and the […]
How to Conduct a Cybersecurity Risk Assessment
This article provides a step-by-step guide for conducting a cybersecurity risk assessment to identify and prioritise potential threats to your business. What I have learned […]