Offense & Defense
Bridges red-team insights with blue-team readiness to shorten detection and response cycles.
Cyber Security Researcher · Standards Advocate · Educator
Thirty years building resilient infrastructure, contributing to global security standards, and teaching teams to defend what matters.
Hands-on with offensive and defensive cyber security since the 1990s. Matthew has designed and hardened UNIX-like environments—Linux, FreeBSD, OpenBSD, HardenedBSD—while teaching teams to interpret threat intelligence, hunt intrusions, and recover from incidents.
He shares his perspective through public speaking, publications, and written guidance that translate emerging threats into actionable playbooks.
Bridges red-team insights with blue-team readiness to shorten detection and response cycles.
Designs secure-by-default network and cloud topologies, stress-tested against modern adversaries.
Develops courses, workshops, and mentoring programs that raise the bar for practitioners.
Matthew represented ANSI as liaison to ISO and the ITU, contributing to foundational security standards within ISO JTC 1 / SC 27, SC 31 / WG 7, and technical committees focused on fraud countermeasures and secure item management.
His work helped establish baseline expectations for radio-frequency identification security, software infrastructure protections, and smart transducer interfaces (ISO/IEC 21450, IEEE 1451).
Precise Modified Julian Date reference with clean visual context.
Live IP telemetry paired with Shodan and VirusTotal for instant situational awareness.
Hosted audiobook with synced manuscript and audio chapters.
A lighter look at path traversal mishaps—memes, cautionary tales, and teachable moments.
Hybrid-signed archives with Reed–Solomon repair, resumable workspaces, and selective restore. Built for cold storage and trust-enforced workflows.
SF128 snowflake variants with live encoder/decoder for telemetry pipelines and deduplicated log IDs.
Experimental P2P messenger with post-quantum key negotiation, proof-of-work gatekeeping, and defensive telemetry.
Quarterly-rotating substitution cipher for teaching key agility, shared secrets, and audit trails.
Field toolkit for sanitizing compromised systems—checklists, detection scripts, and recovery notes from real-world IR.
We run a tiny in-browser proof-of-work to keep bots from bulk-downloading the résumé.
Keep this window open—once verification completes, the download will start automatically.