top of page


Top 10 Ransomware Attacks of This Decade, and What we Learned From Them
Here are 10 of the most significant ransomware attacks since 2020, plus the key lessons they teach us about protecting ourselves. 1. Colonial Pipeline (USA, 2021) What happened: The DarkSide group hit Colonial Pipeline, the largest fuel pipeline operator in the U.S., forcing a temporary shutdown that disrupted fuel supplies along the East Coast . How they got in: Attackers used a compromised password on an old VPN account that did not have multi‑factor authentication (MFA
Charles Martin
Feb 277 min read


Navigating the Evolving Ransomware Landscape: 9 Emerging Risks and How to Safeguard Your Organization
It's no secret that ransomware is a serious issue facing companies today. In fact, 2025 alone saw an estimated 41% of organizations hit with ransomware . It's a sneaky, silent animal that most people are completely unaware of until it strikes with deadly force. If it were an animal, it would look like this: For the realists out there, ransomware is a type of malicious software that locks up your company's data or systems, demanding payment—often in cryptocurrency—to restore a
Charles Martin
Feb 36 min read


Cybersecurity Trends for 2026 (Our Best Guess, at Least)
Looking Back in Order to Look Ahead The last year was an interesting one for cybersecurity. We saw some pretty significant failures, but also some pretty significant developments. And as we step into 2026, the cybersecurity landscape feels more volatile—and more pivotal—than ever. The events of 2025 didn’t just challenge existing defenses; they reshaped the global understanding of what modern threat actors are capable of. Last year saw a surge in cloud intrusions, AI-augmente
Charles Martin
Jan 2210 min read


Palo Alto Networks Unveils SHIELD Governance Framework to Secure AI-Driven Vibe Coding
Palo Alto Networks' Unit 42 just unveiled the SHIELD governance framework, a fresh tool designed to bolster security in vibe coding practices . This initiative helps organizations assess and mitigate risks tied to AI-assisted coding tools, ensuring safer development environments. Because while AI coding boosts productivity, it also opens doors to sneaky security threats like data poisoning or malware insertion. The SHIELD framework aims to solve that. Vibe coding, in case you
Charles Martin
Jan 132 min read


Real Quantum Computing in 2025: What's New, What's Next, and Why It Matters
If you've been scrolling through headlines lately, you've probably noticed quantum computing popping up. And with good reason: 2025 has been a wild year for it, with real strides turning heads from Wall Street to university labs. We're seeing major updates in the field of Quantum Computing, and even some early hints of practical uses. A 30-Second Refresher: What Quantum Computing Actually Is Think of your regular computer as a person in a maze. He picks one path at a time to
Charles Martin
Dec 31, 20255 min read


Why You Should Be Afraid of AI (And It's Probably Not For the Reason You Think!)
Technology dominates how we communicate, learn, and entertain ourselves. From smartphones to smart homes, it helps simplify and enrich our lives. With the emergence of AI, however, we've seen a fascinating mixture of awe and fear that seems to have struck everyone. Maybe it's because Hollywood and literature have spent decades telling us that AI is going to take over the world. In 2001: A Space Odyssey (1968), HAL 9000 is the ultimate polite psychopath: “I’m sorry, Dave. I’m
Charles Martin
Dec 26, 20258 min read


Python Security: Top 3 Practices to Keep Your Applications Safe
The lush ecosystem of Python, with its numerous libraries and frameworks, offers immense power and flexibility. It also opens the door to potential vulnerabilities if not handled with care. As developers, it's important to be vigilant and proactive, ensuring that our Python code remains safe, impervious to the prying eyes and malicious intentions of those who would seek to exploit it. In this post, we'll explore three practices that you can begin implementing into your coding
Charles Martin
Aug 1, 20255 min read


Putting in the Work
There's a fundamental formula in Physics that precisely defines the concept of work : W = Fs : Work (W) equals force (F) multiplied by displacement or distance (s) In order for something to produce work, it must have a force moving it, and it must move some sort of distance. Let's delve deeper into this principle by exploring various scenarios. Imagine applying 0.5 pounds of pressure (Force) to a rubber ball, causing it to roll 3 feet (distance). In this case, the Work would
Charles Martin
Jul 29, 20252 min read


Security Culture Done Right
Most security programs fail. Even with 96% of executives making security a top priority, teams struggle to build lasting security awareness: Cybercrime costs are predicted to exceed $10 trillion annually by the end of 2025 . Roughly 68% of data breaches come down to human factors. Ninety-nine percent of IT leaders know security culture matters, but three-quarters of companies still got hit with security incidents last year. Now, you might think your security culture is sol
Charles Martin
Jul 15, 20254 min read


How will quantum computing affect the way LLMs learn and incorporate data?
Quantum computing has the potential to revolutionize various fields, including natural language processing (NLP) and the functioning of large language models (LLMs).
Charles Martin
Jul 9, 20258 min read


Can Blockchain Security Really Safeguard Your Vibe Coded Apps from Advanced Threats?
In today's quickly-evolving tech landscape where cybersecurity threats become more complex with each year, many developers are struggling to fortify their applications and networks against attacks. One technology in particular---vibe coding--- has proven itself to be quite the double-edged sword . It can speed up the CI/CD pipeline, but it also opens up apps and networks to severe security risks. But even as threats are evolving, so is security, and one increasingly popular
Charles Martin
Jun 24, 20255 min read


Finding an Editor
One mistake I see ALL the time is authors who think they have a brilliant, flawless manuscript and only come to me because they read...
Charles Martin
Feb 9, 20258 min read


Getting Published: Avoiding the Slush Pile
So you're an aspiring writer, and you think you've got THE manuscript, the one every publisher is looking for. The one that will be an...
Charles Martin
Sep 29, 20245 min read
The Dangers of Public Internet
Public internet access can be a convenient way to stay connected while on the go, but it also comes with its own set of risks and...
Charles Martin
Jul 15, 20243 min read


New Piano/Vocal Arrangement for Blue October Sheet Music
A sleek black and white keyboard captured from an artistic angle, highlighting its elegant design and contrasting keys. My newest piano/vocal arrangement is for sale at Sheetmusicplus . It's one of my favorite of Blue October's lesser-known pieces, "All that we Are." Give it a try, and let me know what you think!
Charles Martin
May 11, 20241 min read


Blockchain for Non-Technical People
It's been fifteen years since "Satoshi Nakamoto" released Bitcoin to the world, and it's changed things. Whether it's because it has made...
Charles Martin
Jan 22, 202411 min read


Zero Trust Architecture
I don’t know about the rest of you, but I’m getting a little tired of cyberattacks. I don't mean on my personal accounts or machines, but just in general. It feels like we are seeing an increasing number of these things. Just in the last few months, we have seen attacks on casinos, electoral records, universities, and even cybersecurity service providers. It’s really depressing. Here’s the question, though: why ? Why are these things happening with an alarming frequency? Are
Charles Martin
Nov 14, 20238 min read
The Legend of St. Dominic and the Demon Ape
Originally printed in Catholic Exchange on August 8, 2019 Told by Sean Fitzpatrick Late one night, St. Dominic sat up to write deep...
Charles Martin
Oct 31, 20233 min read


When Your Characters Sound Like . . . You
It's a common problem, even among professional authors: all of your characters sound the same, and they often sound exactly like you. If...
Charles Martin
Oct 18, 20236 min read
VPN Security for CEOs
VPNs and the Pandemic As the CEO of your company, you have dealt with a LOT of stuff over the last few years, most notably - in terms of...
Charles Martin
Aug 20, 20238 min read
bottom of page