6 min read
Why cybersecurity has a foundation problem
Every detection tool sits on top of a layer no one is responsible for. Here is what that layer should look like, and why building it is the work of this decade.
Coming soon on Substack
Field notes, design choices, and arguments we would rather have in public.
Every detection tool sits on top of a layer no one is responsible for. Here is what that layer should look like, and why building it is the work of this decade.
Attackers spend weeks on environmental recon before they move. Defenders get a CMDB from 2019 and a stitched view across six dashboards. This is the gap.
Passive, active, and credentialed signals each tell you something different about the same asset. The work is making them agree.