-Aug 264 min readHacked Vision: OTM Cyber Uncovers Surveillance Camera Software Exploiting US Businesses and Agencies
-May 213 min readThe Psychology Behind Social Engineering Tactics Used to Target Critical Infrastructure
-May 213 min readA Comparative Analysis of Zero Trust and Defense-in-Depth Approaches to Cybersecurity: Historical Perspectives and Differences