BUILD. BREAK. SECURE.
Reverse-engineering real-world threats to build more secure and resilient cloud-native systems.

Software Supply Chain
Secure software delivery, provenance, signing, and pipeline hardening.
Microservices
Threat-driven design for distributed systems, APIs, and service-to-service trust.
Kubernetes
Cloud-native security across workload identity, policy, runtime, and platform defense.
AI
Practical security thinking for modern AI-enabled applications and attack surfaces.
Latest Notes
