Threat Intel
Real-time cyber threat monitoring with MITRE ATT&CK mapping, IOC correlation, and geospatial threat origin analysis.
Independent Systems Research Portfolio
Integration. ERP Security. APIs. Applied Intelligence.
Building connected systems across governance, security, and automation.
INTEGRATION ARCHITECTURE · ERP SECURITY · API ORCHESTRATION · APPLIED AI
The Problem
Organizations deploy dozens of security tools. Each solves one problem. None talk to each other. The translation gap between SoD, threat intel, ERP governance, and AI automation is where risk hides.
Disconnected systems create operational blind spots.
PalyamIQ explores what happens when you connect Segregation of Duties, cyber threat monitoring, ERP governance, and AI-driven automation into coherent, working systems.
Built for security architects, compliance officers, and integration engineers working across governance, security, and integration systems.
The System
Real-time cyber threat monitoring with MITRE ATT&CK mapping, IOC correlation, and geospatial threat origin analysis.
API orchestration with microservices topology, Kafka stream monitoring, and endpoint health across OIC, MuleSoft, and Boomi.
Toxic flow detection, service account monitoring, no-code rule compilation, and supplier intelligence with entity resolution.
Environmental intelligence using NASA EONET data pipelines for natural event monitoring and geospatial risk analysis.
Domain-adapted BERT for release note parsing, LLM security analysis, and intelligent workflow orchestration with NER.
The Architecture
Maximal clique detection for SoD violation discovery. Maps user-role conflicts as a graph and finds the most dangerous combinations.
v2.0 scoring with peer deviation analysis. Control failure probabilities weighted by recency, blast radius, and organizational context.
Connected event-driven pipelines linking SoD scans, threat feeds, ERP transactions, and AI inference into a unified flow.
BERT fine-tuned on Oracle release notes, NER for entity resolution, and interaction information scoring for concurrent change detection.
Research & Writing
How peer deviation analysis and EWMA recency weighting improve control failure detection over traditional rule-based scoring.
Read NotesThe missing link between cyber threat feeds and enterprise access controls. How IOC correlation with SoD violations changes incident response.
Read AnalysisDesigning connected event-driven pipelines that link SoD scans, threat feeds, and AI inference into a unified security intelligence flow.
Read ArchitectureIdentity
PalyamIQ is an independent technical portfolio exploring governance, security, integration, and intelligent automation systems.
Open technical explorations and implementation prototypes. Projects are documented and shared transparently.
Oracle OIC · MuleSoft · Boomi · REST/SOAP · Kafka
SoD Governance · FBDI · OTBI · ESS Jobs · Role Design
Bayesian Scoring · Graph Analysis · BERT · LLM Orchestration