Cyber Threat Intelligence
Real-time cyber threat monitoring with MITRE ATT&CK mapping, IOC correlation, and geospatial threat origin analysis.
Independent Systems Research Portfolio
Integration. ERP Security. APIs. Applied Intelligence.
Building connected systems across governance, security, and automation.
INTEGRATION ARCHITECTURE · ERP SECURITY · API ORCHESTRATION · APPLIED AI
The Problem
Organizations deploy dozens of security tools. Each solves one problem. None talk to each other. The translation gap between SoD, threat intel, ERP governance, and AI automation is where risk hides.
Disconnected systems create operational blind spots.
PalyamIQ explores what happens when you connect Segregation of Duties, cyber threat monitoring, ERP governance, and AI-driven automation into coherent, working systems.
Built for security architects, compliance officers, and integration engineers working across governance, security, and integration systems.
The System
Real-time cyber threat monitoring with MITRE ATT&CK mapping, IOC correlation, and geospatial threat origin analysis.
AI governance for Oracle OIC integration flows. Tracks AI-generated mappings, detects hallucinations, guards sensitive endpoints, and audits every AI-built flow — the first dashboard of its kind.
Toxic flow detection, service account monitoring, no-code rule compilation, and supplier intelligence with entity resolution.
Environmental intelligence using NASA EONET data pipelines for natural event monitoring and geospatial risk analysis.
Domain-adapted BERT for release note parsing, LLM security analysis, and intelligent workflow orchestration with NER.
The Architecture
Detects high-risk access relationships, toxic combinations, and operational anomalies across connected enterprise systems.
Context-aware risk evaluation using behavioral signals, operational patterns, and continuous intelligence scoring.
Connected event-driven workflows linking governance events, enterprise activity, monitoring systems, and intelligent automation.
Intelligent automation pipelines for governance monitoring, anomaly detection, workflow analysis, and operational decision support.
Research & Writing
How peer deviation analysis and EWMA recency weighting improve control failure detection over traditional rule-based scoring.
Read NotesThe missing link between cyber threat feeds and enterprise access controls. How IOC correlation with SoD violations changes incident response.
Read AnalysisDesigning connected event-driven pipelines that link SoD scans, threat feeds, and AI inference into a unified security intelligence flow.
Read ArchitectureIdentity
PalyamIQ is an independent technical portfolio exploring governance, security, integration, and intelligent automation systems.
Open technical explorations and implementation prototypes. Projects are documented and shared transparently.
Oracle OIC · MuleSoft · Boomi · REST/SOAP · Kafka
SoD Governance · FBDI · OTBI · ESS Jobs · Role Design
Risk Intelligence · Connected Insights · Context-Aware Automation · Decision Systems