Curiosity Leads. Experience Guides. Clarity Follows.

I use this space to learn, explore new technologies, and share patterns I come across in security, AI, cloud architecture, wellness, and whatever else catches my curiosity. I also vibe code to kindle my creative side, and thanks to AI for removing the friction. Everything broken down from first principles, based on my own experience and opinions. If you spot anything off, feel free to reach out.

Raj Pandurangan

Rajganesh Pandurangan

Security Architect · Author · 25+ Years in Cybersecurity

My career started in software development. Understanding how things are built made me better at finding where they fall apart. That perspective led me into offensive security, where I spent over 15 years leading penetration testing and red team engagements, finding and exploiting vulnerabilities across thousands of applications, infrastructure environments, and wireless networks. I've published exploits on Exploit-DB and built WAED, an open-source web attack and exploitation distro used by security professionals for training.

For 8 years, I worked as a Qualified Security Assessor (QSA), assessing hundreds of organizations for PCI DSS compliance across retail, finance, and healthcare. That experience gave me a deep understanding of how regulatory frameworks translate into real-world security controls, and where most organizations struggle to close the gap.

I then moved into presales and security strategy, helping position security products for enterprise customers and translating complex technical capabilities into business outcomes. That combination of hands-on technical depth and customer-facing experience shaped how I think about security architecture today.

Most recently, I spent 4+ years at AWS as a Security Specialist, working with some of the largest enterprises in the world on cloud security, identity architecture, and governance at scale. IAM, SCPs, Control Tower, Landing Zone Accelerator, Zero Trust, and everything in between.

Today, I'm focused on the next frontier: AI and agentic security. How do you secure AI agents that make decisions and take actions on behalf of users? How do you govern which models your organization can deploy? How does identity and authorization work when the "user" is an autonomous agent? These are the questions I'm researching and writing about. I write about security the way I wish someone had explained it to me: from first principles, no jargon, one concept building on the last.

CISSP OSCP CKA AWS Solutions Architect Professional AWS Security Specialty AWS DevOps Professional AWS Advanced Networking Specialty
Experience Overview

Offensive Security

15+ years leading penetration testing and red team engagements. Secured thousands of applications, infrastructure, and wireless environments. Published exploits on Exploit-DB. Created WAED (Web Attacks and Exploitation Distro).

Compliance & Risk

8 years as a Qualified Security Assessor (QSA). Assessed hundreds of organizations for PCI DSS compliance across retail, finance, and healthcare. Deep understanding of regulatory frameworks and how to operationalize them.

Cloud Security

4+ years at AWS as a Security Specialist, helping top enterprises secure cloud migrations, design identity architectures, and implement governance at scale. IAM, SCPs, Control Tower, Landing Zone Accelerator.

AI & Agentic Security

Currently focused on securing AI agents, model governance, and the intersection of identity and AI. Researching agentic authorization, Cedar policies, and post-quantum cryptography.

Books

Technical concepts explained from first principles. No prior knowledge required.

OAuth, OIDC & Agent Security

$9.99

From "what is a password" to "securing AI agents with Cedar policies." The complete guide to authentication, authorization, and modern identity, explained from scratch.

OAuth 2.0 OIDC JWT API Security AI Agents

150 pages / PDF + EPUB

Get the Book

Quantum Computing & Post-Quantum Cryptography

$4.99

How encryption works, why quantum computers break it, and how post-quantum cryptography fixes it. From symmetric encryption basics to hybrid TLS 1.3 key exchange.

Cryptography Quantum TLS ML-KEM PQC

95 pages / PDF + EPUB

Get the Book

Blog

Deep dives and first-principles explanations on security, identity, and cloud architecture.

March 2026 · Wellness

Wim Hof Breathing: A Shortcut to the Alpha State

How I use Wim Hof breathing to quickly reach the meditative Alpha state, and how it connects to Silva meditation.

Read more →
March 2026 · Wellness

Silva Meditation: Training Your Mind Like You Train Your Skills

How the Silva Method helped me think clearer, sleep better, and approach problems differently. And why it matters for people in tech.

Read more →
March 2026 · Wellness

The 4-7-8 Breathing Technique

A 60-second breathing technique that resets your nervous system. Why every tech professional should take a minute to breathe.

Read more →
July 2025 · Cloud Security

AWS Steampipe SQL Queries

A collection of working Steampipe SQL queries for AWS. Query IAM, EC2, S3, VPCs, and more using SQL syntax.

Read more →
July 2025 · Personal

What the heck is "SatoriSec"

The story behind the name and what this project is about.

Read more →
January 2025 · Security

Secure Python Server-Client Communication with OpenSSL

Setting up secure Python server and client communication using OpenSSL-generated certificates.

Read more →
November 2023 · Personal

Uncover Your Ikigai: The Japanese Way of Life

Finding what makes you happy and gives your life purpose by discovering the overlap of passion, skill, need, and reward.

Read more →
October 2023 · Security Tools

The Top 10 Nmap Commands You Need to Know

Common Nmap commands with examples for discovering hosts and services on a network.

Read more →
June 2023 · Identity & Security

Introduction to SAML 2.0

Understanding the difference between SAML 2.0 and OIDC for authentication and authorization.

Read more →
February 2023 · Personal

Do You Need an Online Presence?

Why having your own website gives you credibility and how to create one for free.

Read more →
January 2023 · Career

Career Advice for Aspiring Ethical Hackers

Changing industry trends in vulnerability assessment, red teaming, and technical assessments.

Read more →
December 2022 · AWS IAM

IAM Policy: S3 Access with MFA

Create an IAM policy to access S3 bucket objects only when MFA authentication is provided.

Read more →
December 2022 · AWS IAM

Understanding IAM

A high-level overview of AWS IAM service and what you can do with it.

Read more →
June 2022 · Mathematics

The Hunt for Prime Numbers

An overview of various techniques for finding prime numbers and why they matter in cryptography.

Read more →
March 2022 · Security Tools

The Top Netcat Commands: Swiss Army Knife for Hackers

Netcat is a network service for reading and writing connections using TCP or UDP. Here are the essential commands.

Read more →
March 2022 · Career

Polymath vs Specialization

The pros and cons of being a generalist versus a specialist in your career.

Read more →
December 2021 · Python

Setting up Python Playground

Getting started with Python for creating security tools, from basics to advanced features.

Read more →
August 2021 · Personal

Breaking the Cycle: Overcoming the Crisis of Inaction

Constantly planning but never taking action? Here's how to break the cycle.

Read more →