About Meta Taktika

I have always been curious about how complex systems actually work, and why they sometimes fail in ways nobody anticipated... By being compromised, by graceful or ungraceful degradation, because of weak or otherwise nontransparent procedures, or by simply being disrupted by new concepts while having reached obsolescence...

Early in my career I realized that the most interesting challenges in technology rarely sit inside a single tool, platform, or discipline. They emerge where infrastructure, software, security, and business processes intersect. Since then, much of my professional journey has been driven by the attempt to understand these interactions and the behavior of large, complex technological environments.

For more than two decades I have been working across infrastructure engineering, cybersecurity operations, security architecture, consulting, and technology strategy. Throughout that time I have been involved in environments where systems, networks, applications, and business processes are tightly interconnected. Experiences like these gradually shifted my focus away from individual technologies toward broader questions around system behavior, operational resilience, and structural security challenges.

One thing became increasingly clear over the years: modern computing systems have reached a level of complexity that exceeds what any individual - or even a large team consisting of many domain experts can fully understand. Technology stacks grow through layers of abstraction, integrations, and operational overlays. While each layer often solves a specific problem, the overall system becomes harder to reason about, operate, and ultimately secure. And my observation was that adding more tools or more monitoring does not really improve security; in many cases it simply adds more complexity and noise.

This blog is where I explore these structural questions...

One of the ideas I am currently exploring is whether cybersecurity needs to shift its focus away from protecting individual systems or assessing risks with threat-driven frameworks, and instead concentrate on ensuring the integrity and continuity of business processes and value- & supply chains. In such a model, systems become replaceable execution environments, while the real asset to protect is the process that creates value for an organization.

Looking at security from this perspective naturally leads to a different approach to security operations... One that is adaptive, distributed, and increasingly autonomous, rather than assuming that systems can always be trusted; the emphasis moves toward continuously evaluating trust, monitoring process integrity, and reacting dynamically when anomalies occur.

Much of my current thinking revolves around questions such as:

  • how AI-driven security operations could - or actually must evolve
  • how distributed monitoring and swarm-like detection models might work
  • how disposable infrastructure could change operational assumptions
  • and how process-centric trust models could reshape cybersecurity

This blog is not meant to be a marketing channel or a place for quick takes... It is primarily a space to think out loud, explore ideas, challenge established assumptions, and document my ongoing work around the future of cybersecurity and complex technological systems.

...on a side note: from time to time I also touch on related and unrelated topics that influence the broader cybersecurity landscape, whether directly or indirectly. Complex systems rarely evolve in isolation, and developments in adjacent and overarching fields often shape how security problems emerge and how they can eventually be solved.

If you are interested in cybersecurity strategy, intelligence, systems thinking, re-shaping computing paradigms, and the evolution of SecOps, you may find some of the discussions here useful...