AI in security: what actually changes
Why AI changes the speed and shape of security work, but not the deeper reality of motivated attackers, layered controls, and accountability.
Writing
These pieces are designed to teach something useful, show how I think, and create a public record of practical work in AI security, cloud architecture, and compliance.
Why AI changes the speed and shape of security work, but not the deeper reality of motivated attackers, layered controls, and accountability.
Article Index
My view on AI safety is less about evil machines and more about sovereigns, financiers, technocrats, and the people who decide where resources and power go.
Why AI changes the speed and shape of security work, but not the deeper reality of motivated attackers, layered controls, and accountability.
A simple diagram-led breakdown of how I scope, inspect, prioritize, and execute security and architecture work.
The common reasons AI products break under ISO 27001 and SOC 2 scrutiny, and the design moves that help.
How to think about data residency, threat surface, model operations, and where each option fits.
What should be true about access, asset boundaries, recovery, evidence, and change control.
The failure modes I see most often in fast-moving engineering teams and how to address them early.