Blog
Articles focused on cybersecurity fundamentals, infrastructure resilience,
and defensive practice.
February 28, 2026
Before I learned about OWASP or STRIDE, electronics taught me a harsh truth: if a system trusts bad input, it will fail — sometimes violently. ICS and AppSec live in separate worlds, but the problems they face are deeply connected.
December 16, 2025
November 25, 2023. A remote booster station serving 6,000 people in Pennsylvania was accessed by a hostile actor. The international media followed. Defacement banners appeared on the HMI. Operators we
December 7, 2025
A PLC or RTU accepts whatever value reaches its input buffers and applies deterministic logic to it with absolute confidence. And when those upstream signals are manipulated—whether sensor readings, t
December 2, 2025
If you lie to an industrial system about its inputs, it will execute that lie faithfully into the physical world. No hesitation. No intuition. Just deterministic logic doing exactly what it was
November 29, 2025
How SIGINT, ICS, and Application Security Converge in the Invisible Domain We Depend On
August 2, 2025
When it comes to securing Operational Technology (OT) and Industrial Control Systems (ICS), visibility isn’t just nice to have—it’s non-negotiable. If you don’t know what assets exist on your industri
July 18, 2025
In 2025, as organizations adopt zero-trust architectures and AI-powered tools, the core practices of cybersecurity—known as cyber hygiene—remain essential for preventing breaches like ransomware attac
May 5, 2025
A step‑by‑step guide to creating a controlled virtual machine for building and testing cyber defense tools.
April 15, 2025
A primer on critical infrastructure sectors and why cybersecurity professionals should focus on them.
April 1, 2025
Cyber hygiene refers to routine practices like MFA, patching, and strong passwords that prevent most attacks.
March 26, 2025
An introduction to SCADA using a brain-and-body analogy to explain how industrial systems monitor and control the physical world.
December 19, 2024
Salt Typhoon didn't break encryption or exploit zero-days. They exploited a systemic trust assumption present across every sector of critical infrastructure: valid input equals legitimate intent.