Security Leader AI

Advanced Security Research & Insights

Independent security research on AI agent frameworks, OAuth supply-chain vulnerabilities, and defensive strategies for enterprise AI programs and critical infrastructure.

20+ Years Experience • CISSP • CISA • GWAPT • Security Researcher & Advisor

Research by topic

Explore curated research tracks spanning secure AI development, red team methodology, and governance-ready tooling.

LLM Threats

4 curated resources

Explore topic →

Model Context Protocol

3 curated resources

Explore topic →

Supply Chain

4 curated resources

Explore topic →

Automation & Tools

4 curated resources

Explore topic →

Latest insights

Strategic viewpoints for CISOs, AI security leads, and product teams.

Insight

Why I'm Translating OWASP's Security Standard Into Panjabi — And Why It Matters

The OWASP Application Security Verification Standard reaches 130+ million Panjabi speakers for the first time, through a bilingual translation that keeps technical precision intact while making security accessible in Gurmukhi script. Includes the complete security terminology glossary.

2026-02-2614 min read
Read article →
Insight

Master Keys & Shadow Trust: The $1B OAuth Supply-Chain Heist

Analysis of the UNC6395 campaign that weaponized OAuth tokens from Salesloft/Drift to access 700+ Salesforce environments, bypassing MFA entirely. A forensic deconstruction with GWAPT-aligned penetration testing methodology.

2026-02-087 min read
Read article →
Insight

Enhancing GitHub Security Scanning: Integrating AI Threat Taxonomies Into Your DevSecOps Pipeline

How the Arcanum Prompt Injection Taxonomy, AI code anti-patterns, and automated scanning tools can harden your repositories against the emerging wave of AI-driven vulnerabilities.

2026-02-089 min read
Read article →