Skip to content
Papa Corporation

Field Notes

Lessons from the field.

Real problems, real fixes. Technical breakdowns from recent engagements.

Email Security

What 47 Hidden Forwarding Rules Taught Us About Email Security

A financial services firm thought their email was locked down. One InboxWatch scan found 47 forwarding rules silently routing mail outside the organization. Here is what we found, why it matters, and the 3 checks every company should run today.

Read more
AI Engineering

Building a 4-Stage SKU Matching Pipeline That Handles 10,000+ Aliases

When a customer emails asking for '3/8 wire rope galv 500ft' they mean a specific product. But which one of 3,925 SKUs? Here is how we built a matching pipeline that goes from alias lookup to embedding similarity to AI disambiguation, and why each stage exists.

Read more
Sales Automation

Why We Wrote 2,441 Tests for an RFQ Automation System

An automation system that prices and quotes industrial products needs to be correct every time. One wrong decimal and you lose a $40,000 order or quote at a loss. Here is how we built a test suite across 51 suites that lets us ship daily with confidence.

Read more
Security Operations

The Attack Pattern Nobody Watches For: Mailbox Rules

Attackers rarely read your email directly. They create forwarding rules that quietly copy everything to an external address, then they wait. This is the most common post-compromise technique we see, and most security tools miss it entirely.

Read more

Full articles are in progress. In the meantime, check out the InboxWatch blog for 14 published posts on email security.