Security architecture for the operationally honest
Most architecture diagrams describe a posture that nobody can run. Here is what changes when you design for the team that has to operate it at three in the morning.
Detection engineering, incident response, threat-led testing, and the messy human reality of running security in real organisations. Based in the UK, working in UTC.
Practical, opinionated, UK-flavoured resources for taking back control of your exposure and resisting the steady normalisation of surveillance. Long-time supporter of the EFF; long-time user of OpenPGP.
Most architecture diagrams describe a posture that nobody can run. Here is what changes when you design for the team that has to operate it at three in the morning.
Strip the buzzwords away and threat hunting becomes a small, disciplined practice. Here is what it actually looks like in a real estate.
Talent retention is the unspoken metric on which every security programme actually rests. Here is what changes when you start designing the function for the people inside it.