Blog

Practical security writing. No fluff, no vendor content.

·5 min read

How Cybersecurity Teams Actually Use AI: What I Told Students at PBSC

I spoke at Palm Beach State College's Cybersecurity Symposium on how security teams use AI in practice and what students can do right now to prepare.

·31 min read

Preliminary Findings: How Humans Detect AI-Generated Phishing Across 2,511 Classifications

Findings from 153 participants classifying AI-generated phishing: technique-level bypass rates, overconfidence patterns, and what security training misses.

·11 min read

Why Game Mechanics Work for Security Training (and Why Most Vendors Get It Wrong)

Most gamified security training is a quiz with a badge. Real game design looks fundamentally different, and it matters for engagement and measurement.

·4 min read

Threat Terminal v2.0: PvP Is Here

Real-time 1v1 ranked matches, a new unlock ladder, and a terminal AI that will not stop talking. Threat Terminal v2.0 goes live tonight.

·6 min read

What's Coming in Threat Terminal v2

What is changing in Threat Terminal v2: complete UI overhaul, persistent progression, daily challenges, ranked PvP, badges, and a coin economy.

·8 min read

100 Participants: Preliminary Patterns Before the Real Analysis

Preliminary descriptive patterns from 100 participants and 1,612 classified emails in Threat Terminal, before formal statistical analysis begins.

·6 min read

Pilot Data: Which Phishing Techniques Actually Fool People?

Pilot data from 56 participants in Threat Terminal reveals which phishing techniques humans miss most when AI eliminates writing quality as a signal.

·5 min read

Fluent Prose: The Phishing Technique Security Training Ignores

Phishing emails with no urgency, no threats, and no red flags bypass humans at three times the rate of credential harvesting. Training has it backwards.

·5 min read

Your Best Phishing Defense Is Context, Not Analysis

Most people catch phishing because they know they do not have an Apple account, not because they spotted a spoofed domain. That distinction matters.

·6 min read

What Happens When AI Makes Every Phishing Email Perfect?

AI eliminated the grammar errors and broken formatting phishing training taught people to spot. The detection problem is now fundamentally different.

·6 min read

Building a Controlled Phishing Detection Dataset at Scale with the Claude API

How I built a controlled phishing dataset with the Claude API: batching by technique, automated review, and handling rate limits at scale.

·7 min read

Building Threat Terminal: What Actually Went Wrong

Decisions, pivots, and problems behind designing a phishing research study, and why the constraints produced a cleaner methodology than planned.

·4 min read

I Turned MITRE ATT&CK Into a Tarot Deck

Threat intelligence does not have a quality problem. It has an attention problem. Here is what I built to fix that.

·7 min read

I'm Running a Phishing Research Study Inside a Retro Terminal Game

When AI eliminates grammar errors as a detection signal, the question becomes: which phishing techniques produce the biggest gaps in human detection?

·5 min read

Why Your Entra Tenant Probably Has Orphaned Apps with Live Credentials

Enterprise Entra tenants accumulate years of vendor integrations, abandoned POCs, and forgotten service principals. Most have never been audited.

·3 min read

Security Is Applied IT

Most people break into cybersecurity the wrong way. Here is what I actually tell people who ask me how to get started.

·5 min read

Offensive Security Makes You a Better Defender

Security analysts who never touch offensive work are missing something. You cannot fully defend what you have never tried to break.

·5 min read

Breaking Into Cybersecurity: A Roadmap for Students

Cybersecurity is not truly entry-level without serious effort outside the classroom. Here is a nine-step roadmap I wish someone had handed me.