A builder at heart and a strategist by discipline, blending technology, security, and real-world solutions to help organizations scale with confidence. Passionate about turning complex challenges into practical outcomes, with a focus on cybersecurity, technical systems, and emerging digital risks.
With a background rooted in both hands-on problem-solving and strategic advisory, every project is approached with a commitment to simplicity, effectiveness, and authenticity. Believer in building trust through transparency, and scaling impact without losing the human element.
I Built My Own Blog from Scratch: Here's How (and Why)
Why I Decided to Build My Blog In an world where platforms like Substack, Medium, and LinkedIn dominate the content landscape, you might wonder—why bother coding your blog?
For me, it came down to three things:
Ownership: Full control over my content, design, and data Learning: Improving my coding skills, even starting simple Creative Freedom: No platform restrictions I wanted a clean, fast, no-bloat experience that I could fully control, learn, update, and evolve over time. Step 1: Choosing Hugo I chose Hugo, a popular static site generator, because:
...
Understanding PCI DSS 11.6.1: Securing the Client Side of E-Commerce Payment Pages
Introduction PCI DSS 4.0 introduces Requirement 11.6.1, a new expectation to secure the client side of e-commerce environments.
This isn’t a minor update. It is a hard reality check where organizations must detect unauthorized changes directly in consumers’ browsers. Traditional server-side protections are no longer enough.
What PCI DSS 11.6.1 Requires Requirement 11.6.1 mandates that organizations:
Implement mechanisms to detect and alert on unauthorized changes to payment page content and scripts as they load in the consumer’s browser. Specifically, address client-side security, where the user interacts with the page — not just what resides on the server. Evaluate these controls either continuously or at least once every seven days, unless a targeted risk analysis justifies an alternate frequency. Simply, companies must now actively monitor what customers see and interact with, not just what was deployed from their servers.
...
PCI DSS: What It Is, Why It Matters, and How SaaS Companies Should Think About It
A Little History Before PCI DSS, every credit card company had its own security program. Visa had CISP, Mastercard had SDP, Amex had DSOP — and it was a mess. Merchants didn’t know which rules to follow. Security was inconsistent. Fraud was exploding.
In 2004, Visa, Mastercard, Amex, Discover, and JCB finally came together and said: enough. They formed the PCI Security Standards Council (PCI SSC) and created one standard: PCI DSS — the Payment Card Industry Data Security Standard.
...
ISO 27001 Sets the Foundation—But Why Stop There?
ISO 27001 Sets the Foundation—But Why Stop There? How the ISO 27000 family helps SaaS companies scale security and privacy beyond the basics
If you’re running a SaaS company, you’ve already heard of ISO 27001. Maybe you’ve even implemented it. It’s a solid start—arguably the gold standard for building an Information Security Management System (ISMS).
But here’s the thing: ISO 27001 is just the beginning.
The ISO/IEC 27000 series is more than a single framework. It’s a family of standards, each designed to help you customize your security and privacy program to fit your specific risk environment. For SaaS companies operating in cloud-native environments, handling personal data, and facing a fast-moving regulatory landscape, flexibility matters.
...
Understanding SOC 2, PCI DSS, and ISO 27001: Navigating Security and Compliance Frameworks
How to choose the right framework—or combination—for your SaaS business. Security and compliance can feel overwhelming, especially when you’re scaling fast and everyone expects clear answers, from enterprise buyers to your board.
If you’re in SaaS, you’ve likely encountered these names: SOC 2, PCI DSS, and ISO 27001. Maybe they’re on your roadmap. You may have been asked for all three in a single deal cycle.
Here’s the thing: these frameworks aren’t mutually exclusive. Each serves a different purpose. Used strategically, they complement each other and build trust with various audiences.
...