T.O. Mercer
Cybersecurity Researcher and Founder, SafePasswordGenerator.net
Cybersecurity researcher with 10+ years of experience in enterprise security and DevSecOps. I built SafePasswordGenerator.net to provide free, privacy-focused password security tools and education for people who shouldn't need a computer science degree to protect themselves online.
My work focuses on making complex security concepts accessible to everyone, not just technical professionals. I write about password security, data breaches, AI security risks, and the gap between what security teams recommend and what regular people actually do.
My research analyzing 50,000 breached passwords revealed that 89% met corporate password complexity requirements while remaining completely vulnerable, proving that complexity rules alone don't protect anyone.
Background
-
10+ years of enterprise DevSecOps experience across cloud infrastructure, observability platforms, and security monitoring at Fortune 500 companies
-
Former security and solutions engineer specializing in observability platforms, DevSecOps workflows, and cloud-native security architecture
-
AWS Certified Solutions Architect with hands-on expertise in cloud infrastructure security, S3 access controls, and IAM policy design
-
Master of Science in Information Systems, University of Maryland Baltimore County
-
Kubernetes and Cloud Security Associate (KCSA) certified
-
HashiCorp Terraform Associate certified
-
Published breach analysis of 50,000+ breached passwords, featured on HackerNoon with 355K+ Reddit views
-
Expert in enterprise security architecture, identity management, authentication systems, and credential vault design
Research and Publications
- Claude Mythos: What Anthropic's Leaked AI Model Means for Your Security
- I Analyzed 50,000 Breached Passwords: Here's What Hackers Target First
- ETH Zurich Found 27 Flaws in Password Managers
- Bitwarden Pricing 2026: What the 98% Price Increase Actually Means
- Betterment Data Breach 2026: 20-Minute Protection Checklist
- Substack Data Breach 2026: A Cybersecurity Expert's 5-Step Response Plan