Building Security Systems That Survive Contact with Reality
Security architecture looks elegant on whiteboards. Defense in depth, zero trust, least privilege—principles that make sense until they encounter production […]
Security architecture looks elegant on whiteboards. Defense in depth, zero trust, least privilege—principles that make sense until they encounter production […]
Rotating credentials is security hygiene. Everyone agrees. But in practice, credential rotation in large organizations is manual, error-prone, and rarely
In most large organizations, security and engineering operate in different orbits. Security identifies risks. Engineering builds features. When they interact,
Most security policies live in documents. They’re written once, reviewed annually, and ignored daily. Engineers learn to work around them
The Digital Operational Resilience Act mandates that financial institutions build resilient systems. It specifies incident reporting, testing requirements, and third-party
Identity-based access control sounds simple in theory: authenticate users, authorize based on roles, audit everything. In practice, most organizations struggle
Security Theatre in Large Organisations — and Why It Persists I’ve spent enough time in large organisations to recognise a