Insights

Thinking in Graphs

Articles on security architecture, graph theory, risk economics, and the structural patterns that connect technology to business outcomes.

The Firewall Is Not Your Foundation
zero trustnetwork security

The Firewall Is Not Your Foundation

The firewall-first mindset creates fragile networks that collapse on breach. Designing firewall-last forces you to build self-defending nodes, prune unnecessary connections, and treat the perimeter as defense in depth—not a structural dependency.

February 2, 20268 min read
Zero Trust Is a Topology Change, Not an Identity Layer
zero trustgraph theory

Zero Trust Is a Topology Change, Not an Identity Layer

Every vendor is selling Zero Trust. None of them are selling graph databases. That's the problem. You can't determine 'necessary edges' without mapping your current graph—and no identity proxy solves that.

January 23, 20268 min read
Beyond the Kill Chain: Modeling Attacks as State Machines
threat modelingattack modeling

Beyond the Kill Chain: Modeling Attacks as State Machines

The Kill Chain shows attacks as linear progressions. Real attacks loop through lateral movement, branch based on what they find, and restart tactics on every new system. Graph theory models what linear frameworks can't.

January 12, 20268 min read
What the Fall of Thermopylae Teaches Us About Network Security
graph theoryperimeter security

What the Fall of Thermopylae Teaches Us About Network Security

The Spartans built the perfect defensive chokepoint—and were destroyed by a path they didn't know existed. Graph theory reveals why perimeter security fails and what modern defenders must do instead

January 8, 20268 min read
The Missing Foundation of Security Architecture
graph theorysecurity architecture

The Missing Foundation of Security Architecture

You cannot optimize what you cannot measure. Security teams ask graph theory questions—attack paths, blast radius, chokepoints—but use tools built for lists. Here's why that gap is costing you.

December 29, 20258 min read
Risk Ownership Is a Label. Responsibility Is a Burden
risk managementorganizational design

Risk Ownership Is a Label. Responsibility Is a Burden

Risk owner' sounds like a real role, but it's often just a name in a cell. True responsibility requires personal stakes: authority to act, accountability for outcomes, and capability to execute. Here's how to move from documentation to action.

December 17, 20258 min read
From Binary Trade-offs to 3R Optimization
project managementeconomics

From Binary Trade-offs to 3R Optimization

The Iron Triang le gives teams a convenient excuse for failure. The 3R Optimization Model—Revenue, Resources, Risk—forces them to do the math. Here's why marginal analysis beats binary trade-offs.

September 27, 20258 min read
The Intersection Myth: Where Security Optimization Really Happens
risk managementeconomics

The Intersection Myth: Where Security Optimization Really Happens

The optimal security investment isn't where cost equals risk—that's a common misconception. It's where the next dollar spent reduces risk by exactly one dollar. Here's how marginal analysis changes security decision-making.

September 27, 20258 min read