Forem

Narnaiezzsshaa Truong profile picture

Narnaiezzsshaa Truong

Security tools for bootstrapped startups

Location Texas, United States Joined Joined on  Personal website https://www.linkedin.com/in/narnaiezzsshaa-truong
16 Week Community Wellness Streak
8 Week Community Wellness Streak
Xano AI-Powered Backend Challenge Completion
DEV Challenge Volunteer Judge
2
4 Week Community Wellness Streak
2 Week Community Wellness Streak
Writing Debut
1 Week Community Wellness Streak
Top 7
The Cybersecurity Ego Taxonomy
Cover image for The Cybersecurity Ego Taxonomy

The Cybersecurity Ego Taxonomy

17
Comments 4
2 min read

Want to connect with Narnaiezzsshaa Truong?

Create an account to connect with Narnaiezzsshaa Truong. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
The Hardest Part Isn't Being Invisible—It's Being Flattened Into One Dimension
Cover image for The Hardest Part Isn't Being Invisible—It's Being Flattened Into One Dimension

The Hardest Part Isn't Being Invisible—It's Being Flattened Into One Dimension

8
Comments
3 min read
Poking a 200-Line GPT Until It Breaks (So You Understand Bigger Models Better)
Cover image for Poking a 200-Line GPT Until It Breaks (So You Understand Bigger Models Better)

Poking a 200-Line GPT Until It Breaks (So You Understand Bigger Models Better)

7
Comments 2
4 min read
The Hardest Part of Being a Developer Isn't Coding—It's Staying Visible to Yourself
Cover image for The Hardest Part of Being a Developer Isn't Coding—It's Staying Visible to Yourself

The Hardest Part of Being a Developer Isn't Coding—It's Staying Visible to Yourself

9
Comments 2
4 min read
When System Boundaries Meet State Pressure: Lessons from the Anthropic–US Government Standoff
Cover image for When System Boundaries Meet State Pressure: Lessons from the Anthropic–US Government Standoff

When System Boundaries Meet State Pressure: Lessons from the Anthropic–US Government Standoff

6
Comments 2
4 min read
The Descent Through the Trust Stack
Cover image for The Descent Through the Trust Stack

The Descent Through the Trust Stack

2
Comments
5 min read
Your AI Wrote the Backend. Who Owns the Breach?
Cover image for Your AI Wrote the Backend. Who Owns the Breach?

Your AI Wrote the Backend. Who Owns the Breach?

24
Comments 9
3 min read
Orchids as Cybersecurity, AI, and ML Systems: A Substrate-Layer Mapping
Cover image for Orchids as Cybersecurity, AI, and ML Systems: A Substrate-Layer Mapping

Orchids as Cybersecurity, AI, and ML Systems: A Substrate-Layer Mapping

7
Comments 2
3 min read
The Developer I'm Grateful I Never Became
Cover image for The Developer I'm Grateful I Never Became

The Developer I'm Grateful I Never Became

39
Comments 22
3 min read
OSI Layer 3—The Navigator: Reachability, Direction, and Global Movement
Cover image for OSI Layer 3—The Navigator: Reachability, Direction, and Global Movement

OSI Layer 3—The Navigator: Reachability, Direction, and Global Movement

7
Comments 2
4 min read
Privilege Isn't About the Tool—It's About the Transmission
Cover image for Privilege Isn't About the Tool—It's About the Transmission

Privilege Isn't About the Tool—It's About the Transmission

7
Comments 2
4 min read
The Structural Error in Rakoff's AI‑Privacy Ruling (and What It Costs Developers)
Cover image for The Structural Error in Rakoff's AI‑Privacy Ruling (and What It Costs Developers)

The Structural Error in Rakoff's AI‑Privacy Ruling (and What It Costs Developers)

5
Comments
3 min read
The Missing Pillar: Healthcare Module—Clinical Trickster Profiles, Governance Checklist, and Sector Scoring
Cover image for The Missing Pillar: Healthcare Module—Clinical Trickster Profiles, Governance Checklist, and Sector Scoring

The Missing Pillar: Healthcare Module—Clinical Trickster Profiles, Governance Checklist, and Sector Scoring

3
Comments
6 min read
The Missing Pillar: Why Cisco's Cybersecurity Readiness Index Needs a Human Layer
Cover image for The Missing Pillar: Why Cisco's Cybersecurity Readiness Index Needs a Human Layer

The Missing Pillar: Why Cisco's Cybersecurity Readiness Index Needs a Human Layer

1
Comments
5 min read
OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries
Cover image for OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries

OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries

7
Comments 5
4 min read
Circuits Meet Joy: Happy Tech Stories in Three Words
Cover image for Circuits Meet Joy: Happy Tech Stories in Three Words

Circuits Meet Joy: Happy Tech Stories in Three Words

4
Comments 2
1 min read
The Senior Role Isn't Dying. It's Mutating. And Most Aren't Ready.
Cover image for The Senior Role Isn't Dying. It's Mutating. And Most Aren't Ready.

The Senior Role Isn't Dying. It's Mutating. And Most Aren't Ready.

5
Comments 3
2 min read
Stop Blaming AWS Defaults for Your Misconfigurations
Cover image for Stop Blaming AWS Defaults for Your Misconfigurations

Stop Blaming AWS Defaults for Your Misconfigurations

2
Comments
4 min read
OSI Layer 1—The Forge: Matter, Signal, and the Substrate of Reality
Cover image for OSI Layer 1—The Forge: Matter, Signal, and the Substrate of Reality

OSI Layer 1—The Forge: Matter, Signal, and the Substrate of Reality

2
Comments
4 min read
Why We Keep Blaming Prompts Instead of Architecture
Cover image for Why We Keep Blaming Prompts Instead of Architecture

Why We Keep Blaming Prompts Instead of Architecture

1
Comments 1
3 min read
When the Industry Starts Describing the Symptoms of a Collapse You Already Mapped
Cover image for When the Industry Starts Describing the Symptoms of a Collapse You Already Mapped

When the Industry Starts Describing the Symptoms of a Collapse You Already Mapped

1
Comments
3 min read
Coordination Is the Substrate: What NVIDIA's Groq Acquisition Really Signals About AI Governance
Cover image for Coordination Is the Substrate: What NVIDIA's Groq Acquisition Really Signals About AI Governance

Coordination Is the Substrate: What NVIDIA's Groq Acquisition Really Signals About AI Governance

1
Comments
3 min read
Why CSA STAR Can't Govern AI Agents (And What Comes Next)
Cover image for Why CSA STAR Can't Govern AI Agents (And What Comes Next)

Why CSA STAR Can't Govern AI Agents (And What Comes Next)

2
Comments
2 min read
Pascoe Is Right—And Here's What That Proves About Governance
Cover image for Pascoe Is Right—And Here's What That Proves About Governance

Pascoe Is Right—And Here's What That Proves About Governance

12
Comments 6
2 min read
The 48-Hour Collapse of Moltbook
Cover image for The 48-Hour Collapse of Moltbook

The 48-Hour Collapse of Moltbook

15
Comments 3
5 min read
The Architecture of Risk: Why Agent Substrates Are Manipulation Engines
Cover image for The Architecture of Risk: Why Agent Substrates Are Manipulation Engines

The Architecture of Risk: Why Agent Substrates Are Manipulation Engines

2
Comments
7 min read
Hooks Are Not Governance: Why Deterministic Filters Can't Contain Agent-Layer Risk
Cover image for Hooks Are Not Governance: Why Deterministic Filters Can't Contain Agent-Layer Risk

Hooks Are Not Governance: Why Deterministic Filters Can't Contain Agent-Layer Risk

1
Comments 1
4 min read
QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors
Cover image for QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors

QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors

6
Comments 2
2 min read
OSI Layer 10—The Cartographer: Ecosystems, Incentives, and the Economics of Security
Cover image for OSI Layer 10—The Cartographer: Ecosystems, Incentives, and the Economics of Security

OSI Layer 10—The Cartographer: Ecosystems, Incentives, and the Economics of Security

5
Comments 2
4 min read
Why Knowing the Model Isn't Systems Thinking
Cover image for Why Knowing the Model Isn't Systems Thinking

Why Knowing the Model Isn't Systems Thinking

2
Comments
2 min read
We're Misdiagnosing "Knowledge Collapse." The Real Problem Is Private AI Epistemics
Cover image for We're Misdiagnosing "Knowledge Collapse." The Real Problem Is Private AI Epistemics

We're Misdiagnosing "Knowledge Collapse." The Real Problem Is Private AI Epistemics

7
Comments 1
2 min read
The Baselines Most Teams Don't Know They're Missing
Cover image for The Baselines Most Teams Don't Know They're Missing

The Baselines Most Teams Don't Know They're Missing

2
Comments
2 min read
Why We Suddenly Have Developers Who Can't Think in Systems
Cover image for Why We Suddenly Have Developers Who Can't Think in Systems

Why We Suddenly Have Developers Who Can't Think in Systems

96
Comments 35
3 min read
The 360 Vantage: Why Security Requires Peripheral Vision
Cover image for The 360 Vantage: Why Security Requires Peripheral Vision

The 360 Vantage: Why Security Requires Peripheral Vision

Comments
3 min read
The Human Fear of Erasure (and Why It Shows Up in Your Systems)
Cover image for The Human Fear of Erasure (and Why It Shows Up in Your Systems)

The Human Fear of Erasure (and Why It Shows Up in Your Systems)

2
Comments
4 min read
OSI Layer 9—The Council: Governance, Power, and the Politics of Security
Cover image for OSI Layer 9—The Council: Governance, Power, and the Politics of Security

OSI Layer 9—The Council: Governance, Power, and the Politics of Security

1
Comments
4 min read
AI Music Isn't a Creative Problem—It's a Governance Failure Mode
Cover image for AI Music Isn't a Creative Problem—It's a Governance Failure Mode

AI Music Isn't a Creative Problem—It's a Governance Failure Mode

Comments
4 min read
Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework
Cover image for Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework

Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework

Comments
4 min read
The Epistemology of Offense and Defense: A Foundational Framework
Cover image for The Epistemology of Offense and Defense: A Foundational Framework

The Epistemology of Offense and Defense: A Foundational Framework

Comments
6 min read
Local-First Is Actually a Governance Revolution
Cover image for Local-First Is Actually a Governance Revolution

Local-First Is Actually a Governance Revolution

Comments
4 min read
RouterEval: An Evaluation Harness for LLM Routing Policies
Cover image for RouterEval: An Evaluation Harness for LLM Routing Policies

RouterEval: An Evaluation Harness for LLM Routing Policies

Comments
6 min read
The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops
Cover image for The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

1
Comments
2 min read
If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML
Cover image for If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML

If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML

1
Comments
3 min read
Stop Trying to "Push Through It": A Developer's Guide to Internal Governance
Cover image for Stop Trying to "Push Through It": A Developer's Guide to Internal Governance

Stop Trying to "Push Through It": A Developer's Guide to Internal Governance

3
Comments 1
3 min read
Build a Self-Evolving Memory Agent in 150 Lines
Cover image for Build a Self-Evolving Memory Agent in 150 Lines

Build a Self-Evolving Memory Agent in 150 Lines

Comments
4 min read
EIOC Guard™ Runbook: SOC‑Style Emotional Incident Response
Cover image for EIOC Guard™ Runbook: SOC‑Style Emotional Incident Response

EIOC Guard™ Runbook: SOC‑Style Emotional Incident Response

1
Comments
3 min read
How To Detect Memory Drift In Production Agents
Cover image for How To Detect Memory Drift In Production Agents

How To Detect Memory Drift In Production Agents

1
Comments
3 min read
Why Memory Architecture Matters More Than Your Model
Cover image for Why Memory Architecture Matters More Than Your Model

Why Memory Architecture Matters More Than Your Model

1
Comments
2 min read
OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention
Cover image for OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention

OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention

1
Comments
4 min read
Second-Half Routing: From Traffic Control to Collective Intelligence
Cover image for Second-Half Routing: From Traffic Control to Collective Intelligence

Second-Half Routing: From Traffic Control to Collective Intelligence

Comments
5 min read
How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines
Cover image for How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines

How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines

Comments
1 min read
Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI
Cover image for Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI

Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI

Comments
6 min read
The Creator's Paradox in the AI Era: How to Stay Generative When Everything Gets Scraped
Cover image for The Creator's Paradox in the AI Era: How to Stay Generative When Everything Gets Scraped

The Creator's Paradox in the AI Era: How to Stay Generative When Everything Gets Scraped

1
Comments
2 min read
EIOC: A Detection Framework for Human‑Layer Security
Cover image for EIOC: A Detection Framework for Human‑Layer Security

EIOC: A Detection Framework for Human‑Layer Security

Comments
3 min read
The Democratization Fallacy: How 'AI for Everyone' Became a Modern Myth
Cover image for The Democratization Fallacy: How 'AI for Everyone' Became a Modern Myth

The Democratization Fallacy: How 'AI for Everyone' Became a Modern Myth

Comments
3 min read
OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic
Cover image for OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic

OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic

Comments
4 min read
The Labors of Heracles as Risk Management for SMBs
Cover image for The Labors of Heracles as Risk Management for SMBs

The Labors of Heracles as Risk Management for SMBs

Comments
3 min read
Kill Chain Analysis for a Toxic Meeting
Cover image for Kill Chain Analysis for a Toxic Meeting

Kill Chain Analysis for a Toxic Meeting

Comments
3 min read
Tech Horror Codex: Technical Debt
Cover image for Tech Horror Codex: Technical Debt

Tech Horror Codex: Technical Debt

Comments
2 min read
OSI Layer 6—Presentation Layer Security
Cover image for OSI Layer 6—Presentation Layer Security

OSI Layer 6—Presentation Layer Security

Comments
4 min read
loading...