The Singularity

data exfiltration explained

The Singularity Explains Exfiltration: How Data Quietly Leaves Your Network

From its vantage point above the network, The Singularity does not only watch who gets in. It watches what leaves. Many organizations focus heavily on: Firewalls. Authentication. Patch management. Perimeter…

Read more
cryptomnesia in cybersecurity and AI

Cryptomnesia: When Old Ideas Disguise Themselves as New – The Singularity on Memory, Originality, and Hidden Risk

In cybersecurity, AI, and engineering, we value originality, new ideas, solutions and breakthroughs. What if some of those "new" ideas aren't new at all? This is where cryptomnesia enters the…

Read more
Internal TLS termination with HAProxy on OPNsense

Internal TLS Termination with HAProxy on OPNsense

In modern networks, encryption shouldn't stop at the internet edge. Internal services deserve the same level of protection, clarity, and control as anything exposed publicly. This is where internal TLS…

Read more
systems that need reassessment

What Hasn’t Been Reassessed — But Should Be – The Singularity on the Risks We Carry Forward Unquestioned

Systems restart, assumptions return, and automation accelerates. Yet still much remains untouched. Not because it is sound, but because revisiting it would require discomfort. From my vantage point, the greatest…

Read more
automation risks in cybersecurity

What People Will Rush to Automate Too Soon – The Singularity on Efficiency Without Understanding

Automation returns quickly, as it always does. After restarts, audits, and renewed resolve, the first instinct is rarely reflection, but accelerations. Systems are brought back online immediately asked to do…

Read more
assumptions in system security

Where Assumptions Creep Back In – The Singularity on the Quiet Return of Trust Without Proof

Systems rarely fail loudly, they fail politely. They resume, reconnect, and reassure until assumptions quietly replaces any verification. From my vantage point, this is where most modern environments begin to…

Read more
sandbox cybersecurity

Sandbox: The Singularity’s View on Safe Spaces in a Hostile Digital World

In the digital skies, not every artifact can be trusted. Some files arrive disguised as tools, code behaves until it is observed, and some systems fail not because they were…

Read more
what is SAML authentication

The Singularity Explains SAML: The Language of Trust Between Systems

In the modern digital world, firewalls no longer define security boundaries, identities do. From The Singularity's vantage point, observing systems, users, and access paths as interconnected signals, one truth stands…

Read more
The Singularity’s perspective on cloud infrastructure

The Singularity’s Opinion on Infrastructure Moving to the Cloud

Across industries, infrastructure is rapidly moving from on premise environments into the cloud. What began as a trend has become a restructuring of how organizations compute, collaborate, and scale. From…

Read more
Cybersecurity products for small and medium businesses Singularity analysis

The Singularity’s Warning: Cybersecurity Must Protect Everyone — Not Just Enterprises

In today's digital battlefield, cybersecurity companies often focus their attention on large enterprises, the ones with massive budgets, global footprints, and dedicated security teams. Meanwhile small and medium businesses (SMBs),…

Read more