Cross-platform encryption is a pain - different languages, same algorithm, different implementations. Here's working AES-256 code for C#, Node.js, and PowerShell that actually interoperates correctly, so you don't have to debug crypto edge cases.
Six years after receiving 'Getting Naked' during Slalom onboarding, I finally read it. The three fears that sabotage client loyalty - embarrassment, feeling inferior, losing business - hit hard. Being vulnerable is terrifying, but it's also where growth happens.
The security field is constantly evolving. While Application Security has been around since the early 2000s, Product Security has only gained popularity in the last 5-8 years. Is Product Security just a rebrand of AppSec? There's no universal agreement on what it actually is.
A guide to filing IFR practice approaches in the Seattle area, including the unique approach code system used by Seattle Approach for concise flight plan remarks.
After 500+ days of waiting for registration issues, engine upgrades, and magneto problems, I finally flew my Beechcraft Bonanza 1,000 miles from Riverside, California to the Pacific Northwest.
Investments Unlimited hit close to home - a financial firm forced to fix their security posture discovers the same issues I face daily: outdated asset inventories, useless CABs, inconsistent pipelines. The message is clear: automate everything, don't block velocity, and dig beneath surface assumptions.
Father's Day gift turned into supercar comparison test: Ferrari 488 GTB, Porsche GT3 RS, Lamborghini Huracan, and Shelby GT500 at Pacific Raceways. Spoiler alert: the American muscle car with 760hp destroyed the Italian exotics for pure driving excitement.
Two product management books sparked an unexpected realization about the intersection between customer behavior analytics, security telemetry, and audit logging. Sometimes the most valuable insights come from applying frameworks outside their intended domain.
At 13, I built elaborate Excel spreadsheets of car modifications I couldn't afford. Now I'm doing it again with aircraft - researching every possible STC for a 1977 A36 Bonanza. Unlike cars, certified aircraft modifications require FAA approval, but that just makes the research more interesting.
After a decade of accidentally falling into security and building teams across multiple domains, I've learned that the most successful security professionals share three crucial soft skills: genuine passion for the work, empathy for the teams they impact, and understanding of business context over absolute security.