cryptographic agility

Cryptographic Agility: Designing for Change, Planning for Failure

Indecision is the basis of flexibility. WHAT IS CRYPTOGRAPHIC AGILITY? Cryptographic agility is the principle of designing systems in a way that allows cryptographic algorithms and protocols to be swapped out with minimal friction. Is opposite is hardcoding: rather than embedding a specific algorithm like RSA or SHA-256 deep within your application, you externalize it, … Read more

Rethinking Log Management

Rethinking Log Management

Imagine standing in the British Library. Millions of books, no organization, no labeling—just shelves overflowing with unsorted information. Somewhere in that chaos is a clue to stop a thief, and it’s your job to find it. That’s what modern cybersecurity teams face every day.

Cryptography pre- and post-quantum

What are we doing here? Cryptography pre-and post-quantum

And when you look along the way we’ve come, there are spirals of vultures wheeling. — Bruce Chatwin, The Songlines (2012) THE NEED FOR SECURITY Sometimes we need a gentle reminder of harsh realities. Security isn’t a luxury item; security is a basic precondition for survival. At the very basis of the pyramid formed by … Read more

an act of war

Is our definition of ‘an act of war’ outdated?

When we think of war, most of us picture something loud and visible. Tanks rolling through fields, soldiers in uniform, fighter jets in the sky. It’s an image shaped by decades of physical conflict. And one that still holds true in many parts of the world. But today, some of the most serious attacks do … Read more

Zero Trust from conviction

Zero Trust from conviction, not fear

Security isn’t about locking doors after intruders have come and gone. It’s about designing a world where they never get in. Imagine waking up to find someone’s broken into your house. You change the locks, install cameras, maybe even adopt a loud dog. But deep down, you know the truth: you acted too late. That’s … Read more

signed, sealed, subverted.

Signed, Sealed, Subverted: What Broken Cryptography Teaches Us About Trust

The Trusted Signature You’re alone in a quiet gallery of the Rijksmuseum, the soft hum of security systems barely audible beneath the air conditioning. A dim spotlight falls on a delicate sketch, its ink lines sharp against aged parchment. The plaque reads: Rembrandt van Rijn, ca. 1640. Experts have certified it. It’s catalogued, insured, cited. … Read more