Skip to content
Feather of peacock is a symbol of transcendent knowledge

Reinvent The Self!

  • Books
  • Algorithms
  • Empty Ground
  • Iconography
  • Intersections
  • Justice
  • Love
  • Personalities
  • Philosophy
  • Presence
  • Self-Inquiry
  • Stories
  • Causality
  • Ethics
  • After The Ladder
  • Wonderment
  • Information Security
  • Psychology
  • Leadership
  • Consciousness
Download

Reinvent The Self!

  • Books
  • Algorithms
  • Empty Ground
  • Iconography
  • Intersections
  • Justice
  • Love
  • Personalities
  • Philosophy
  • Presence
  • Self-Inquiry
  • Stories
  • Causality
  • Ethics
  • After The Ladder
  • Wonderment
  • Information Security
  • Psychology
  • Leadership
  • Consciousness

Category: Information Security

  • The Four Layers of Refuge

    The Four Layers of Refuge

    May 2, 2026
    Philosophy, Personalities, consciousness, Information Security

    What the Ramayana Quietly Teaches About Protection There is a structure inside the Ramayana that the epic never states directly… Read more

  • The Vocabulary of Readiness

    The Vocabulary of Readiness

    Apr 12, 2026
    Information Security, Leadership, Management

    On the Limits of the Manthana and the Disciplines That Refine It Every thesis worth stating is worth qualifying. The… Read more

  • The Manthana: On AI Security Governance, Equipoise, and Why the Devas Were Ready

    The Manthana: On AI Security Governance, Equipoise, and Why the Devas Were Ready

    Apr 12, 2026
    Information Security, Leadership, Management

    Capability is churned together, Distribution is decided above, Readiness is the only Asymmetric Advantage There is a moment in every… Read more

  • When AI Finds Your Zero-Days: Patanjali, Brené Brown, and the Courage to Be Vulnerable

    When AI Finds Your Zero-Days: Patanjali, Brené Brown, and the Courage to Be Vulnerable

    Apr 8, 2026
    Information Security, Presence

    From Patch to Posture, from Wariness to Awareness: A reflection on Anthropic’s Mythos, ancient yoga philosophy, and the future of… Read more

  • I. Think. Therefore, IAM- 5- Closing Note- The Perturbation Principle

    I. Think. Therefore, IAM- 5- Closing Note- The Perturbation Principle

    Apr 1, 2026
    Information Security

    The essay argues that a Zero Trust system’s Default Deny state reflects an essential ethical foundation rather than a mere… Read more

  • I. Think. Therefore, IAM- Part 4- The Ultimate Orchestrator

    I. Think. Therefore, IAM- Part 4- The Ultimate Orchestrator

    Apr 1, 2026
    Information Security

    The text explores the intersection of technology and spirituality, emphasizing the shift from manual control to autonomous execution in system… Read more

  • I. Think. Therefore, IAM- Part 3- Friction as Systemic Mindfulness

    I. Think. Therefore, IAM- Part 3- Friction as Systemic Mindfulness

    Apr 1, 2026
    Information Security

    This content explores the concept of Alert Fatigue within a Zero Trust architecture, highlighting the often-overlooked importance of friction points… Read more

  • I. Think. Therefore, IAM- Part 2- The Architecture of Impermanence

    I. Think. Therefore, IAM- Part 2- The Architecture of Impermanence

    Apr 1, 2026
    Information Security

    The article discusses the concepts of Identity, Access, and Action within the context of Zero Trust security. It argues that… Read more

  • I. Think. Therefore, IAM- Part 1- The Zero Trust Invariant

    I. Think. Therefore, IAM- Part 1- The Zero Trust Invariant

    Apr 1, 2026
    Information Security

    The content discusses the concept of Zero Trust, emphasizing that trust is about the alignment of authenticated identity and authorized… Read more

  •  I think. Therefore, IAM: A series on Identity, Access, and the Architecture of Trust 

     I think. Therefore, IAM: A series on Identity, Access, and the Architecture of Trust 

    Apr 1, 2026
    Information Security

    Descartes’ idea that thinking proves existence is limited; action is crucial for true knowledge. This series argues that identity and… Read more

1 2
→

The Easiest Way
to Design Block Themes.

  • Bluesky
  • Mastodon
  • LinkedIn

Blog at WordPress.com.

  • Subscribe Subscribed
    • Reinvent The Self!
    • Already have a WordPress.com account? Log in now.
    • Reinvent The Self!
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar