Insights

Structure Shapes Outcomes

From risk economics to graph theory to hands-on infrastructure — how structural thinking connects strategy to implementation.

847 Alarms at 4 AM
vulnerability managementrisk prioritization

847 Alarms at 4 AM

The Three Mile Island operators were drowning in alerts when they shut off the emergency cooling. Your platform team is drowning in CVEs. Both problems have the same root cause — and the nuclear industry solved it decades ago.

March 4, 20269 min read
CloudFront VPC Origins: what breaks and how to fix it
AWSCloudFront

CloudFront VPC Origins: what breaks and how to fix it

CloudFront VPC Origins eliminate public IPs and load balancers, but introduce three engineering problems — TLS provisioning, WebSocket limitations, and a volume attachment deadlock — that don't exist with traditional architectures.

February 24, 202616 min read
Customer isolation from the infrastructure up
AWSIAM

Customer isolation from the infrastructure up

How per-customer blast radius containment works across layers of AWS infrastructure — IAM, network, DNS, identity, storage, state, compute, and ingress — each enforcing isolation on its own.

February 22, 202614 min read
Alert Fatigue Is an Autoimmune Disease
siemsoar

Alert Fatigue Is an Autoimmune Disease

The average SOC gets 4,484 alerts per day and ignores most of them. That's autoimmune disease, not a detection gap. How Jerne's Immune Network Theory maps onto graph-based architectures that suppress noise instead of generating more of it.

February 21, 202611 min read
The Water You Trust
supply chainmarginal analysis

The Water You Trust

From the siege of Kirrha to SolarWinds, attackers bypass walls by compromising what's already trusted. Why authentication proves provenance but not intent, and how to allocate scarce verification budget across a dependency graph you'll never fully see.

February 13, 202613 min read
Where the Map Ends
graph theorysecurity architecture

Where the Map Ends

The Củ Chi tunnels were 250 kilometers of passages dug with shovels. The US had satellites. The tunnels worked because they exploited topology, not topography. Attackers still do.

February 4, 20267 min read
The Firewall Is Not Your Foundation
zero trustnetwork security

The Firewall Is Not Your Foundation

The firewall-first mindset creates fragile networks that collapse on breach. Designing firewall-last forces you to build self-defending nodes, prune unnecessary connections, and treat the perimeter as defense in depth—not a structural dependency.

February 2, 20269 min read
Zero Trust Is a Topology Change, Not an Identity Layer
zero trustgraph theory

Zero Trust Is a Topology Change, Not an Identity Layer

Every vendor is selling Zero Trust. None of them are selling graph databases. That's the problem. You can't determine 'necessary edges' without mapping your current graph—and no identity proxy solves that.

January 23, 20267 min read
Beyond the Kill Chain: Modeling Attacks as State Machines
threat modelingattack modeling

Beyond the Kill Chain: Modeling Attacks as State Machines

The Kill Chain shows attacks as linear progressions. Real attacks loop through lateral movement, branch based on what they find, and restart tactics on every new system. Graph theory models what linear frameworks can't.

January 12, 202610 min read
What the Fall of Thermopylae Teaches Us About Network Security
graph theoryperimeter security

What the Fall of Thermopylae Teaches Us About Network Security

The Spartans built the perfect defensive chokepoint—and were destroyed by a path they didn't know existed. Graph theory reveals why perimeter security fails and what modern defenders must do instead

January 8, 202611 min read
The Missing Foundation of Security Architecture
graph theorysecurity architecture

The Missing Foundation of Security Architecture

You cannot optimize what you cannot measure. Security teams ask graph theory questions—attack paths, blast radius, chokepoints—but use tools built for lists. Here's why that gap is costing you.

December 29, 20258 min read
Risk Ownership Is a Label. Responsibility Is a Burden
risk managementorganizational design

Risk Ownership Is a Label. Responsibility Is a Burden

Risk owner' sounds like a real role, but it's often just a name in a cell. True responsibility requires personal stakes: authority to act, accountability for outcomes, and capability to execute. Here's how to move from documentation to action.

December 17, 202512 min read
From Binary Trade-offs to 3R Optimization
project managementeconomics

From Binary Trade-offs to 3R Optimization

The Iron Triang le gives teams a convenient excuse for failure. The 3R Optimization Model—Revenue, Resources, Risk—forces them to do the math. Here's why marginal analysis beats binary trade-offs.

September 27, 20259 min read