I haven't actually read your article yet, but I really dislike the "everything is fat formatting". Maybe you would like to rethink that. There is a technical article that I really enjoyed to read: https://www.cloudflare.com/dns/dnssec/root-signing-ceremony/
Maybe you can take a look with regard to fonts and formatting and make some adjustments to your content.
It works but it's so clunky.
I used to use Sandboxie to sandbox everything - especially my web browser. With Bookmark and history syncing on, throwing away all the changes when you shut down the browser and the sandbox deleted itself was no problem, and the binary had no meaningful access to the host OS. Sadly it started giving me issues and recently it's been in some turmoil, https://sandboxie-plus.com seems to be one open sourced variant that's still worked on though, I think I'll have to see what's going on there.
We've updated the report to include a check for the patches released by Microsoft.
We've created a extra report to identify which assets have updated to the Office version with the EX255650 bug.
There's matrix, it supports bridging to many other services. It's not perfect (esp. since you have to spin up your own matrix server to set some bridges up yourself), but it has a lot of potential to grow.
I work at Appgate, but note that my reply is written from a vendor-neutral POV. I have a forthcoming book on Zero Trust Security, so I've been thinking about this a lot over the last year : https://www.amazon.com/Zero-Trust-Security-Enterprise-Guide/dp/148426701X/