Security
Fortinet’s Quiet War on Linux Workstations
·430 words·3 mins
How Fortinet’s licensing changes force Linux engineers into costly VPN workarounds, creating operational risk.
If You Can Read It in OWA, You Can Archive It: A Playwright Approach
·1176 words·6 mins
The ISO 27001 Hallucination: Documenting Your Way to Disaster
·1163 words·6 mins
ISO 27001 documentation can give a false sense of security, leading to compliance illusions and enterprise risk.
The Apeldoorn Illusion: A Post-Mortem of Dutch Digital Sovereignty
·790 words·4 mins
A post-mortem of Dutch digital sovereignty failures, exploring enterprise and systemic IT accountability.
The DJI and AP Collapse: A Masterclass in Institutional Hypocrisy
·334 words·2 mins
A case study of institutional failures in cybersecurity and governance, highlighting systemic risks in enterprise IT.
The Badge, The Burnout, and the Backdoor: Why Scammers Love Your CISO
·639 words·3 mins
How burnout and gamification create easy targets for social engineering attacks on enterprise admins.
The State of SSH: Neglect Disguised as Stability
·740 words·4 mins
SSH infrastructure is often treated as stable, but neglect can create hidden vulnerabilities in enterprise environments.
The Panopticon Economy: How the EU is Building China-Lite
·638 words·3 mins
Inception-Level Evasion: When Your EDR Can’t See the Linux VM Hiding in Windows
·1114 words·6 mins
Pro-Russian hackers exploit Linux VMs inside Windows to bypass EDR, creating a critical security blind spot.
You Blocked ChatGPT? That’s Cute. Your Data Still Leaks.
·568 words·3 mins
That Cybersecurity Alarm Bell? It's Ringing for All of Us in the Netherlands.
·970 words·5 mins
NCSC's Late-Stage Panic: BYOD Is Risky? No Shit.
·1659 words·8 mins
My Personal Take: Company Laptops - Security Ain't Everything (But It's Still My Job, Damn IT)
·1207 words·6 mins
A personal reflection on company laptop security, balancing policy, autonomy and practical IT responsibilities.