Essays
-
Granularity: The Hidden Determinant of Security Boundaries
Encryption alone does not define security.
This essay argues that the true determinant of breach impact is the granularity of runtime protection. -
The $400 Million IDaaS Breach Lessons
Major breaches at Microsoft, Okta, and LastPass reveal a shared failure:
highly sensitive authentication data was exposed while in memory.
This essay explains why per-process memory encryption must become the foundation of next-generation identity security. -
The End of the MFA Myth
Real-time phishing dismantles the MFA myth.
If authentication relies on transferable information,
the boundary does not exist.