Thanks for subscribing to my site! I spend a lot of time here putting together things that I think will be useful, and you get access to all of it now.


As a member, you now have full access to the site (including historical WYSK articles and downloads of content like Obsidian vaults). You also have access to receive the site's newsletters (click here to update your email subscriptions).

You now also have the ability to comment on posts. Please do! Review the community guidelines to understand the intent and rules behind comments.

Your data is protected as laid out in the privacy policy.

You'll find four main types of content here:

  • Analysis of major events or news stories (usually focusing on governance, security, and economics). I'll also offer my opinion, but even better you'll get the sources and data behind it. The weekly WYSK newsletter falls under this category.
  • Cybersecurity articles, mostly focusing on ransomware and critical infrastructure, but also some how-to articles on development.
  • Notes and how-tos on Obsidian, my favorite app for note taking and personal knowledge management!
  • Quick thoughts, original thoughts synthesizing key facts, trends, or theories to  clarify issues (I'm biased, but I think these are some of the best resources here).

WYSK comes out (usually) weekly, while the other articles are more sporadic. In general, though, they come out monthly.

Curious about the name?

This article explains the meaning behind "Twelve Tables," and the three core virtues of this blog.

What you can expect:

Here are seven of my most-read articles:

Taking notes with Obsidian
Obsidian is a powerful note-taking application, but with a bit of a learning curve. This post provides a brief overview and detailed setup instructions.
Wrapper Development for Mythic C2
This how-to walks through building a generic C# wrapper for Mythic C2 version 2.1
Why “Twelve Tables”?
The “Twelve Tables” were a series of laws developed in Rome ~450BC. To me, and as the inspiration for this blog name, the Twelve Tables embody three virtues that I seek to pursue here.
Isaiah 29:13-16
Learning from Isaiah how to love God personally, depend on Him, and submit to His plans.
The Rubicon Theory of Social Media
Social media’s stated function as a vehicle for relationship and connection is generally inaccurate. Instead, social media’s structure most often causes users’ mindsets to become more aggressive, overconfident, and less rational.
Hacking/Infosec Resources
Hacking resources: links, tutorials, courses, and books on security. This post will continue to be updated with new resources.
Dances with Wolves: A Response to Nick Clegg’s ‘It Takes Two to Tango’
There are three critical issues with Clegg’s analysis of Facebook that need to be considered.

Thanks for joining!