Forem

Narnaiezzsshaa Truong profile picture

Narnaiezzsshaa Truong

Security tools for bootstrapped startups

Location Texas, United States Joined Joined on  Personal website https://www.linkedin.com/in/narnaiezzsshaa-truong
8 Week Community Wellness Streak
Xano AI-Powered Backend Challenge Completion
DEV Challenge Volunteer Judge
2
4 Week Community Wellness Streak
2 Week Community Wellness Streak
Writing Debut
1 Week Community Wellness Streak
Top 7
The Missing Pillar: Why Cisco's Cybersecurity Readiness Index Needs a Human Layer
Cover image for The Missing Pillar: Why Cisco's Cybersecurity Readiness Index Needs a Human Layer

The Missing Pillar: Why Cisco's Cybersecurity Readiness Index Needs a Human Layer

1
Comments
5 min read

Want to connect with Narnaiezzsshaa Truong?

Create an account to connect with Narnaiezzsshaa Truong. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries
Cover image for OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries

OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries

7
Comments 5
4 min read
Circuits Meet Joy: Happy Tech Stories in Three Words
Cover image for Circuits Meet Joy: Happy Tech Stories in Three Words

Circuits Meet Joy: Happy Tech Stories in Three Words

4
Comments 2
1 min read
The Senior Role Isn't Dying. It's Mutating. And Most Aren't Ready.
Cover image for The Senior Role Isn't Dying. It's Mutating. And Most Aren't Ready.

The Senior Role Isn't Dying. It's Mutating. And Most Aren't Ready.

5
Comments 3
2 min read
Stop Blaming AWS Defaults for Your Misconfigurations
Cover image for Stop Blaming AWS Defaults for Your Misconfigurations

Stop Blaming AWS Defaults for Your Misconfigurations

2
Comments
4 min read
OSI Layer 1—The Forge: Matter, Signal, and the Substrate of Reality
Cover image for OSI Layer 1—The Forge: Matter, Signal, and the Substrate of Reality

OSI Layer 1—The Forge: Matter, Signal, and the Substrate of Reality

2
Comments
4 min read
Why We Keep Blaming Prompts Instead of Architecture
Cover image for Why We Keep Blaming Prompts Instead of Architecture

Why We Keep Blaming Prompts Instead of Architecture

1
Comments 1
3 min read
When the Industry Starts Describing the Symptoms of a Collapse You Already Mapped
Cover image for When the Industry Starts Describing the Symptoms of a Collapse You Already Mapped

When the Industry Starts Describing the Symptoms of a Collapse You Already Mapped

1
Comments
3 min read
Coordination Is the Substrate: What NVIDIA's Groq Acquisition Really Signals About AI Governance
Cover image for Coordination Is the Substrate: What NVIDIA's Groq Acquisition Really Signals About AI Governance

Coordination Is the Substrate: What NVIDIA's Groq Acquisition Really Signals About AI Governance

1
Comments
3 min read
Why CSA STAR Can't Govern AI Agents (And What Comes Next)
Cover image for Why CSA STAR Can't Govern AI Agents (And What Comes Next)

Why CSA STAR Can't Govern AI Agents (And What Comes Next)

2
Comments
2 min read
Pascoe Is Right—And Here's What That Proves About Governance
Cover image for Pascoe Is Right—And Here's What That Proves About Governance

Pascoe Is Right—And Here's What That Proves About Governance

12
Comments 6
2 min read
The 48-Hour Collapse of Moltbook
Cover image for The 48-Hour Collapse of Moltbook

The 48-Hour Collapse of Moltbook

15
Comments 3
5 min read
The Architecture of Risk: Why Agent Substrates Are Manipulation Engines
Cover image for The Architecture of Risk: Why Agent Substrates Are Manipulation Engines

The Architecture of Risk: Why Agent Substrates Are Manipulation Engines

2
Comments
7 min read
Hooks Are Not Governance: Why Deterministic Filters Can't Contain Agent-Layer Risk
Cover image for Hooks Are Not Governance: Why Deterministic Filters Can't Contain Agent-Layer Risk

Hooks Are Not Governance: Why Deterministic Filters Can't Contain Agent-Layer Risk

1
Comments 1
4 min read
QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors
Cover image for QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors

QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors

6
Comments 2
2 min read
OSI Layer 10—The Cartographer: Ecosystems, Incentives, and the Economics of Security
Cover image for OSI Layer 10—The Cartographer: Ecosystems, Incentives, and the Economics of Security

OSI Layer 10—The Cartographer: Ecosystems, Incentives, and the Economics of Security

5
Comments 2
4 min read
Why Knowing the Model Isn't Systems Thinking
Cover image for Why Knowing the Model Isn't Systems Thinking

Why Knowing the Model Isn't Systems Thinking

2
Comments
2 min read
We're Misdiagnosing "Knowledge Collapse." The Real Problem Is Private AI Epistemics
Cover image for We're Misdiagnosing "Knowledge Collapse." The Real Problem Is Private AI Epistemics

We're Misdiagnosing "Knowledge Collapse." The Real Problem Is Private AI Epistemics

7
Comments 1
2 min read
The Baselines Most Teams Don't Know They're Missing
Cover image for The Baselines Most Teams Don't Know They're Missing

The Baselines Most Teams Don't Know They're Missing

2
Comments
2 min read
Why We Suddenly Have Developers Who Can't Think in Systems
Cover image for Why We Suddenly Have Developers Who Can't Think in Systems

Why We Suddenly Have Developers Who Can't Think in Systems

96
Comments 34
3 min read
The 360 Vantage: Why Security Requires Peripheral Vision
Cover image for The 360 Vantage: Why Security Requires Peripheral Vision

The 360 Vantage: Why Security Requires Peripheral Vision

Comments
3 min read
The Human Fear of Erasure (and Why It Shows Up in Your Systems)
Cover image for The Human Fear of Erasure (and Why It Shows Up in Your Systems)

The Human Fear of Erasure (and Why It Shows Up in Your Systems)

2
Comments
4 min read
OSI Layer 9—The Council: Governance, Power, and the Politics of Security
Cover image for OSI Layer 9—The Council: Governance, Power, and the Politics of Security

OSI Layer 9—The Council: Governance, Power, and the Politics of Security

1
Comments
4 min read
AI Music Isn't a Creative Problem—It's a Governance Failure Mode
Cover image for AI Music Isn't a Creative Problem—It's a Governance Failure Mode

AI Music Isn't a Creative Problem—It's a Governance Failure Mode

Comments
4 min read
Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework
Cover image for Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework

Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework

Comments
4 min read
The Epistemology of Offense and Defense: A Foundational Framework
Cover image for The Epistemology of Offense and Defense: A Foundational Framework

The Epistemology of Offense and Defense: A Foundational Framework

Comments
6 min read
Local-First Is Actually a Governance Revolution
Cover image for Local-First Is Actually a Governance Revolution

Local-First Is Actually a Governance Revolution

Comments
4 min read
RouterEval: An Evaluation Harness for LLM Routing Policies
Cover image for RouterEval: An Evaluation Harness for LLM Routing Policies

RouterEval: An Evaluation Harness for LLM Routing Policies

Comments
6 min read
The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops
Cover image for The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

1
Comments
2 min read
If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML
Cover image for If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML

If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML

1
Comments
3 min read
Stop Trying to "Push Through It": A Developer's Guide to Internal Governance
Cover image for Stop Trying to "Push Through It": A Developer's Guide to Internal Governance

Stop Trying to "Push Through It": A Developer's Guide to Internal Governance

3
Comments 1
3 min read
Build a Self-Evolving Memory Agent in 150 Lines
Cover image for Build a Self-Evolving Memory Agent in 150 Lines

Build a Self-Evolving Memory Agent in 150 Lines

Comments
4 min read
EIOC Guard™ Runbook: SOC‑Style Emotional Incident Response
Cover image for EIOC Guard™ Runbook: SOC‑Style Emotional Incident Response

EIOC Guard™ Runbook: SOC‑Style Emotional Incident Response

1
Comments
3 min read
How To Detect Memory Drift In Production Agents
Cover image for How To Detect Memory Drift In Production Agents

How To Detect Memory Drift In Production Agents

1
Comments
3 min read
Why Memory Architecture Matters More Than Your Model
Cover image for Why Memory Architecture Matters More Than Your Model

Why Memory Architecture Matters More Than Your Model

1
Comments
2 min read
OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention
Cover image for OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention

OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention

1
Comments
4 min read
Second-Half Routing: From Traffic Control to Collective Intelligence
Cover image for Second-Half Routing: From Traffic Control to Collective Intelligence

Second-Half Routing: From Traffic Control to Collective Intelligence

Comments
5 min read
How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines
Cover image for How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines

How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines

Comments
1 min read
Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI
Cover image for Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI

Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI

Comments
6 min read
The Creator's Paradox in the AI Era: How to Stay Generative When Everything Gets Scraped
Cover image for The Creator's Paradox in the AI Era: How to Stay Generative When Everything Gets Scraped

The Creator's Paradox in the AI Era: How to Stay Generative When Everything Gets Scraped

Comments
2 min read
EIOC: A Detection Framework for Human‑Layer Security
Cover image for EIOC: A Detection Framework for Human‑Layer Security

EIOC: A Detection Framework for Human‑Layer Security

Comments
3 min read
The Democratization Fallacy: How 'AI for Everyone' Became a Modern Myth
Cover image for The Democratization Fallacy: How 'AI for Everyone' Became a Modern Myth

The Democratization Fallacy: How 'AI for Everyone' Became a Modern Myth

Comments
3 min read
OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic
Cover image for OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic

OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic

Comments
4 min read
The Labors of Heracles as Risk Management for SMBs
Cover image for The Labors of Heracles as Risk Management for SMBs

The Labors of Heracles as Risk Management for SMBs

Comments
3 min read
Kill Chain Analysis for a Toxic Meeting
Cover image for Kill Chain Analysis for a Toxic Meeting

Kill Chain Analysis for a Toxic Meeting

Comments
3 min read
Tech Horror Codex: Technical Debt
Cover image for Tech Horror Codex: Technical Debt

Tech Horror Codex: Technical Debt

Comments
2 min read
OSI Layer 6—Presentation Layer Security
Cover image for OSI Layer 6—Presentation Layer Security

OSI Layer 6—Presentation Layer Security

Comments
4 min read
Tech Horror Codex: Vendor Lock‑In
Cover image for Tech Horror Codex: Vendor Lock‑In

Tech Horror Codex: Vendor Lock‑In

Comments
2 min read
EIOC as a Detection Model: From Framework to Code
Cover image for EIOC as a Detection Model: From Framework to Code

EIOC as a Detection Model: From Framework to Code

Comments
5 min read
Tech Horror Codex: Data Gravity
Cover image for Tech Horror Codex: Data Gravity

Tech Horror Codex: Data Gravity

Comments
2 min read
Tech Horror Codex: Substrate Sovereignty
Cover image for Tech Horror Codex: Substrate Sovereignty

Tech Horror Codex: Substrate Sovereignty

Comments
2 min read
Computers Are Dumb. That’s Why AI Feels So Dangerous—and So Useful.
Cover image for Computers Are Dumb. That’s Why AI Feels So Dangerous—and So Useful.

Computers Are Dumb. That’s Why AI Feels So Dangerous—and So Useful.

Comments
3 min read
OSI Layer 5—Session Layer Security
Cover image for OSI Layer 5—Session Layer Security

OSI Layer 5—Session Layer Security

Comments
4 min read
OSI Layer 4—The Steward
Cover image for OSI Layer 4—The Steward

OSI Layer 4—The Steward

Comments
4 min read
Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects
Cover image for Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects

Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects

Comments
2 min read
EIOC in Human-AI Interaction: A Framework for Trust, Agency, and Collaborative Intelligence
Cover image for EIOC in Human-AI Interaction: A Framework for Trust, Agency, and Collaborative Intelligence

EIOC in Human-AI Interaction: A Framework for Trust, Agency, and Collaborative Intelligence

5
Comments
3 min read
When Inefficiency Has a Price Tag: Why "Good Habits" Aren't Optional in SMB/S Software Development
Cover image for When Inefficiency Has a Price Tag: Why "Good Habits" Aren't Optional in SMB/S Software Development

When Inefficiency Has a Price Tag: Why "Good Habits" Aren't Optional in SMB/S Software Development

2
Comments
3 min read
When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means
Cover image for When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

Comments
4 min read
EIOC for Engineers, PMs, and AI Safety Practitioners
Cover image for EIOC for Engineers, PMs, and AI Safety Practitioners

EIOC for Engineers, PMs, and AI Safety Practitioners

Comments
3 min read
Anansi’s Web as Neural Architecture: From Folklore to Framework
Cover image for Anansi’s Web as Neural Architecture: From Folklore to Framework

Anansi’s Web as Neural Architecture: From Folklore to Framework

Comments
2 min read
loading...