Obsidian Ridge

Blog

Field notes from a working security practitioner

Practical writeups on tools, compliance, incident response, personal security, and what actually matters when security has to work in the real world.

Categories

Explore by category

AI Security

LLM security, prompt injection, AI governance, and practical guidance on using AI safely in real organizations.

View category

Compliance

SOC 2, HIPAA, CMMC, PCI-DSS, ISO 27001, audit prep, and control mapping for growing teams.

View category

Device Management

MDM, Intune, JAMF, Addigy, Workspace ONE, and Kandji guidance for secure device fleets.

View category

Endpoint & Detection

EDR, MDR, XDR, Huntress, SentinelOne, CrowdStrike, Defender, and practical endpoint detection guidance.

View category

Personal Security

Online scams, identity theft, family digital safety, and personal cybersecurity explained in plain language.

View category

Security Awareness

Phishing simulation, scam recognition, social engineering, and awareness training programs that actually change behavior.

View category

Threat Intelligence & Incident Response

Threat actor profiles, recent breaches, vendor compromises, and incident response playbooks.

View category

Featured

Search

Find the topic you need

Recent

Recent articles across the site