Blog

Insights on cybersecurity, architecture, and engineering

Introducing Keepacy: The Quiet System That Finds Your Family When It Matters

Keepacy is a secure vault and delivery system for the things families actually need when someone is gone. Here's how we built it, and why.

Read more →

Compliance Will Not Save You

SOC 2, ISO 27001, HIPAA, CMMC — passing them is not the same as being secure. Compliance describes a floor, not a ceiling.

Read more →

The Blast Radius Problem

Blast radius — how damage propagates from a single point of failure — is a design choice. Most architectures are brittle on containment.

Read more →

Zero Trust Doesn't Change When the Actor Is a Machine

Zero trust was a response to architectures that assumed safety based on location. AI agents are being deployed with the same assumption.

Read more →

Who Is Actually Logged In? Identity When the Actor Is an AI Agent

When an AI agent acts on behalf of a user, the identity model is more complicated than 'the user authorized it.' That gap has consequences.

Read more →

Freight Optimization Software: How uRoute Cuts Carrier Costs 15-30%

How we built uRoute's freight optimization software — multi-module Java TMS with an automated load-matching engine that delivers 15-30% freight cost reduction for broker operations.

Read more →

What I've Been Building: An AI Personal Assistant

I've been running an AI system with real access to real infrastructure. The architecture, the decisions, and what I'd do differently.

Read more →

AI Systems Have an Architecture Problem Too

Prompt injection is being treated as a prompt problem. It isn't. It's an architecture problem — and it's the same one we've already described.

Read more →

What AI Actually Changes About Security — and What It Doesn't

AI is being described as a fundamental transformation of the security landscape. Some of that is true. Most of the important parts aren't.

Read more →

Human Error Is Predictable. Cascading Failure Is Optional.

Humans make mistakes at a predictable rate. Security is one of the last domains still designing systems that require perfect behavior.

Read more →

Why MFA Didn't Solve Phishing — and What It Actually Did

MFA was supposed to end credential theft. It didn't. Understanding why reveals the architectural mistake we keep making.

Read more →

Authentication Is a Conclusion. It Should Be a Signal.

Why treating authentication as a one-time gate instead of a continuous signal is the root cause of credential theft incidents.

Read more →

Building a Federated Lung Cancer Research Platform for IASLC

How we built a federated lung cancer research platform for IASLC — hub-and-spoke architecture, portable Docker algorithm containers, and 80% compute reduction across 10+ international sites.

Read more →

Designing a Linear Broadcast Scheduling Interface for NBCUniversal

How we designed a linear broadcast scheduling interface for NBCUniversal — 20+ network feeds, time-zone math, zero-downtime deployments, and the architecture that holds it all together.

Read more →

How We Built Lung Cancer Screening Software for Global Clinical Use

How we built lung cancer screening software on the bones of VA-PALS — modernizing MUMPS to TypeScript, integrating AI-assisted CT reading, and shipping it to three continents.

Read more →