top of page

Cloud Espionage in the Crosshairs: How Murky Panda Is Weaponizing Entra ID Trust
Cloud Espionage in the Crosshairs: How Murky Panda Is Weaponizing Entra ID Trust
Patrick Duggan
Aug 29, 20252 min read


Build It Like You Mean It
Build It Like You Mean It
Patrick Duggan
Aug 29, 20253 min read
“McDonald's, I came here to chew bubblegum and secure your pipeline… and I’m all outta bubblegum.”
“McDonald's, I came here to chew bubblegum and secure your pipeline… and I’m all outta bubblegum.”
Patrick Duggan
Aug 28, 20252 min read


How to Review OAuth in Atlassian Products Without Losing Your Sanity
How to Review OAuth in Atlassian Products Without Losing Your Sanity
Patrick Duggan
Aug 27, 20252 min read
Why the UNC6395 Breach Is Likely to Cascade—Just Like Snowflake’s Did
Why the UNC6395 Breach Is Likely to Cascade—Just Like Snowflake’s Did
Patrick Duggan
Aug 27, 20252 min read
Guest Blog Post: “Zero Trust, Zero Soul: Why I Hate Your IAM Stack”
Guest Blog Post: “Zero Trust, Zero Soul: Why I Hate Your IAM Stack”
Patrick Duggan
Aug 26, 20252 min read


Rebooting the Machine: Modernization in Practice
Rebooting the Machine: Modernization in Practice
Patrick Duggan
Aug 22, 20252 min read


Guest Blog Post: “The Algorithmic Antichrist: How AI Became the Enemy of Anarchy - by Tyler Durden”
Guest Blog Post: “The Algorithmic Antichrist: How AI Became the Enemy of Anarchy - by Tyler Durden”
Patrick Duggan
Aug 22, 20253 min read


Shrink the Blast Radius, Baby: Salesforce Permissions for Demon-Free Admins
Shrink the Blast Radius, Baby: Salesforce Permissions for Demon-Free Admins
Patrick Duggan
Aug 20, 20252 min read


Conan the Barbarian shares real life tips for Salesforce Security!
Conan the Barbarian shares real life tips for Salesforce Security!
Patrick Duggan
Aug 19, 20252 min read


Counterpoint: Lo Pan’s Manifesto: Let the Botnets Rise
Counterpoint: Lo Pan’s Manifesto: Let the Botnets Rise
Patrick Duggan
Aug 19, 20252 min read


Big Trouble in Little Firmware
Big Trouble in Little Firmware
Patrick Duggan
Aug 19, 20252 min read
🛸 Introducing “Insecurities”: Where Enterprise Security Gets Weird
🛸 Introducing “Insecurities”: Where Enterprise Security Gets Weird
Patrick Duggan
Aug 17, 20252 min read


Guest Post by Bender: “CSPM? More Like Can’t Secure Properly, Meatbags.”
Guest Post by Bender: “CSPM? More Like Can’t Secure Properly, Meatbags.”
Patrick Duggan
Aug 15, 20252 min read


CNAPPs: The Swiss Army Knife of Cloud Security or Just Another Buzzword?
CNAPPs: The Swiss Army Knife of Cloud Security or Just Another Buzzword?
Patrick Duggan
Aug 15, 20252 min read
🧠 “Sweet Cybernetic Bureaucracy!” — Hermes Reacts to Colt Telecom’s Ransomware Fiasco
🧠 “Sweet Cybernetic Bureaucracy!” — Hermes Reacts to Colt Telecom’s Ransomware Fiasco
Patrick Duggan
Aug 15, 20252 min read


Understanding Global Architectures in Cloud Technology
Understanding Global Architectures in Cloud Technology
Patrick Duggan
Aug 15, 20255 min read


Enhancing Hybrid Security: Best Practices and Strategies
Enhancing Hybrid Security: Best Practices and Strategies
Patrick Duggan
Aug 15, 20255 min read


Top Cloud Security Trends You Need to Know
Top Cloud Security Trends You Need to Know
Patrick Duggan
Aug 15, 20254 min read


🕶️ “Good News, Everyone!” You Can’t Attack What You Can’t See—Unless You’re Bender
🕶️ “Good News, Everyone!” You Can’t Attack What You Can’t See—Unless You’re Bender
Patrick Duggan
Aug 15, 20253 min read
bottom of page