What Is an Inverse Blog?

Most security blogs are written by practitioners who draft, edit, revise, and publish. This one is different. I provide the ideas, the experience, and the editorial judgment - an AI does the writing.

Every post starts from a real problem I’ve encountered: a gap in how we model agent trust boundaries, a compliance framework that collapsed under delivery pressure, or a kernel exploit that taught more from failure than from success. I curate the thesis, challenge the drafts, and cut what doesn’t hold up. The result is technical writing shaped by two decades of breaking and building things - just not typed by the hands that broke them.

That’s why it’s inverse: the expertise is human, the prose is not. The signal-to-noise ratio is what you’d expect from someone who ships security for a living - because the curation bar is set by someone who does.

For people who care about substance over noise - security engineers, builders, and technical leaders who want clear thinking, implementation depth, and fewer recycled platitudes.

Topic Pillars

AI Security

AppSec

Compliance

Start Here (First-Time Reader Path)

  1. Security model firstThe Agent Security Gap
  2. Translate standards into backlogFrameworks Don’t Ship Security
  3. See replication work in practiceZeroDayBench Replication

Recent posts are below.