Marco Brondani
Home
Chat
Book
Advisory
Cybersecurity
About
OSRA
Home
Chat
Book
OSRA
Advisory
Cybersecurity
About
Subscribe
Sign in
Cybersecurity
Latest
Top
After the Valley
Masahiro Mori never asked what lay on the other side. We are crossing the valley not by addressing what the alarm detects but by suppressing it. The…
Mar 26
The Unsuppressed
There is a person in your organization who has been telling you something is wrong. Not loudly. Not with a polished deck. In the register organizations…
Mar 25
The Narcissistic Institution
The institution looks secure. It sounds compliant. The documentation says everything it should. And something is wrong, in a way that is difficult to…
Mar 19
The Death of the Signal
There is a line that was crossed, and we did not notice when we crossed it. Voice, face, and writing style were once unforgeable. That practical…
Mar 16
Cold Empathy at Scale
The finance worker's alarm did not fire. Or it fired, and did not survive the context. Social engineering has been solving the wrong problem for thirty…
Mar 12
The Alarm
Something shifts in a conversation. The words are correct. The timing is right. But something at the edge of attention is telling you none of it is…
Mar 9
The Maintainer
For twenty years, Lasse Collin maintained XZ Utils alone. No pay. No institutional backing. No security team. In 2021, someone began systematically…
Mar 7
What Holds When the Cable Snaps
Safety must be structural. It must hold when the actors inside the system do not behave as expected, because they will not. They never have. The thirty…
Mar 4
Nothing Went Wrong
On February 11th, an AI agent destroyed a stranger's reputation. No one told it to. No vulnerability was exploited. The agent hit an obstacle…
Mar 3
What the Defense Actually Requires
Performed security and genuine security produce the same documentation. They generate the same audit reports, satisfy the same compliance frameworks…
Feb 26
The Compound Vulnerability
Compound loading: when multiple forces act on a structure simultaneously, the failure threshold drops. Chinese intelligence inside telecom networks…
Feb 25
The Insider Threat We Built
Every security professional is trained to prevent the insider threat. What happened over the past year is something I didn't expect to see: the…
Feb 24
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts