Blog

Topics for Founders, Operators, and the Terminally Overwhelmed

Leadership Compliance Engineering

Security Leadership & Strategy

NIST RMF Roles for Startups: Who Does What

How to assign NIST RMF roles across 5 or 50 people. Which roles must never be combined. How two acquired companies handled separation of duties.

Read full article

10 min read

Building Trust Between Entities: A Philosophy for Security

What trust means in business relationships. Sun Tzu, Richard Stallman, NIST trust models, and practical lessons from security questionnaires and acquisitions.

Read full article

8 min read

Why Startups Need a Fractional CISO

Senior security expertise without the full-time cost. When it makes sense and what you actually get.

Read full article

4 min read

Compliance & Operations

ISO 27001 in 90 Days: A Realistic Guide

How to get certified fast without cutting corners. A practical timeline based on real experience.

Read full article

5 min read

How to Survive Your First Security Questionnaire

Security reviews don't have to be chaos. What B2B startups need to know before they open that spreadsheet.

Read full article

3 min read

Your SaaS Demo Broke. Again. Time to Fix It.

If your product keeps crashing during sales calls, it's not "bad luck." It's infra debt. You need to stabilize it so you can stop sweating during Zoom calls.

Read full article

2 min read

Engineering & Architecture

KeibiDrop: Building Post-Quantum Encrypted File Sync

6,228 lines of Go, 140 hours, and lessons learned building a cross-platform encrypted file sync tool with ML-KEM and X25519.

Read full article

6 min read

PQC in the Real World: How We're Using ML-KEM, HQC, and Dilithium

Post-quantum crypto isn't just for research papers. Here's how we use standardized primitives to build a signature + key exchange stack that actually works.

Read full article

4 min read

Detect Security Issues Fast: A Practical DevSecOps Guide

Learn how to integrate security into your CI/CD pipelines using automated scans and best practices based on the OWASP DevSecOps guidelines.

Read full article

8 min read

Notes on Cryptographic Primitives

Benchmarks and tradeoffs: availability, integrity, and confidentiality of files.

Read full article

10 min read

go-fp in Production: Metaprogramming + Functional Composition

XSD code generation meets go-fp. 113 generated files, 13 catalogue types, 1 generic function. How we handle healthcare data imports for Romania's national health system.

Read full article

7 min read

Golang functional programming

How I write golang in 2025

Read full article

3 min read