Joe Lopes

Joe Lopes

Infosec Engineer. Logs of my cyber yamadori.
Cyberpunk robot holding a skull like Hamlet.

To Detect or Not to Detect

Guidelines for evaluating effective SOC detections.

· 5min · Joe Lopes
To Detect or Not to Detect
Illustration of a green radar with AI symbols.

Towards Actionable Detection

Actionable detection for relevant and contextual alerts.

· 4min · Joe Lopes
Towards Actionable Detection
The Missing Readme book cover.

The Missing Readme

A guide to modern software engineering and career development.

· 5min · Joe Lopes
The Missing Readme
Countdown to Zero Day book cover.

Countdown to Zero Day

Stuxnet and the launch of the world's first digital weapon.

· 7min · Joe Lopes
Countdown to Zero Day
Astronauts during the Apollo 7 debriefing.

Project Nebula: Debriefing

Final thoughts and improvements for the Nebula detection lab.

· 7min · Joe Lopes
Project Nebula: Debriefing
Elastic logo.

Project Nebula: Detecting with Elastic

Elastic Stack deployment for log monitoring.

· 13min · Joe Lopes
Project Nebula: Detecting with Elastic
Wazuh logo.

Project Nebula: Detecting with Wazuh

Setting up Wazuh for log collection and detection rules.

· 9min · Joe Lopes
Project Nebula: Detecting with Wazuh
Photo of the Crab Nebula.

Project Nebula: Build a Simple Detection Lab

Easy guide to setting up a simple detection engineering lab.

· 7min · Joe Lopes
Project Nebula: Build a Simple Detection Lab
Practical Threat Detection Engineering book cover.

Practical Threat Detection Engineering

Review of Practical Threat Detection Engineering book.

· 5min · Joe Lopes
Practical Threat Detection Engineering
Google Chronicle logo.

Auto-Cleaning Lists in Chronicle SIEM

Automate Chronicle SIEM list cleanup for expired items.

· 9min · Joe Lopes
Auto-Cleaning Lists in Chronicle SIEM
Illustration of a cyberpunk spider netadmin.

Endpoint Security Reflections feat. EDR

Comparing EDR with alternative endpoint solutions.

· 8min · Joe Lopes
Endpoint Security Reflections feat. EDR
MISP logo.

Integrating MISP with Chronicle SIEM

Integrate CTI and CSIRT automatically and efficiently.

· 15min · Joe Lopes
Integrating MISP with Chronicle SIEM
Illustration of a cyberpunk myth buster.

Debunking Threat Detection Myths

Debunking threat detection myths for improved SecOps.

· 4min · Joe Lopes
Debunking Threat Detection Myths
Illustration of a woman putting her finger on a screen.

How to Sign Commits in Git(Hub)

Use cryptography to secure Git commits and boost reliability.

· 4min · Joe Lopes
How to Sign Commits in Git(Hub)
Google Sheets logo.

Portfolio Tracker v4

Version 4 of my portfolio tracker spreadsheet.

· 7min · Joe Lopes
Portfolio Tracker v4
Illustration of a cyberpunk cooker octopus.

Improving SecOps Beyond Tuning Analytics

· 5min · Joe Lopes
Improving SecOps Beyond Tuning Analytics
Clifford Stoll, author of The Cuckoo's Egg.

The Cuckoo's Egg

A 1980s Infosec thriller with groundbreaking investigations.

· 6min · Joe Lopes
The Cuckoo's Egg
Illustration of a cyberpunk character thinking atop a building.

The Threat Detection Fundamental Dilemma

Exploring the precision vs. recall dilemma in threat detection.

· 8min · Joe Lopes
The Threat Detection Fundamental Dilemma
Illustration of a cyberpunk robot fixing a car.

A Little Hardening with Burp

How I used Burp to improve this blog's security.

· 3min · Joe Lopes
A Little Hardening with Burp
MITRE ATT&CK logo.

MITRE ATT&CK 101: Bridging the Gap

Guide to MITRE ATT&CK with history and context for better usage.

· 10min · Joe Lopes
MITRE ATT&CK 101: Bridging the Gap
A compass with integrated circuit.

Testing The Logfile Navigator

Log analysis with lnav: challenges, insights, and tips.

· 6min · Joe Lopes
Testing The Logfile Navigator
MITRE ATT&CK logo.

Getting Real About MITRE ATT&CK

Understanding MITRE ATT&CK and using it in your favor.

· 4min · Joe Lopes
Getting Real About MITRE ATT&CK
Engineer planning a house.

Insights into Effective SIEM Deployment

Strategies and tips for successful SIEM deployment.

· 8min · Joe Lopes
Insights into Effective SIEM Deployment
Cyberpunk cyborg blueprint.

Mastering your Performance

Tools, rituals, and reflections for growth in Infosec.

· 11min · Joe Lopes
Mastering your Performance
Security Operations robots monitoring alerts.

Understanding Severity and Priority

Find the best settings for consistent detection alerts.

· 3min · Joe Lopes
Understanding Severity and Priority
Productive hacker using his tools.

Productivity Unleashed

Boost productivity with tools and a streamlined process.

· 7min · Joe Lopes
Productivity Unleashed
Intelligence-Driven Incident Response book cover.

Intelligence-Driven Incident Response

How integrating CTI enhances Threat Detection and CSIRT.

· 4min · Joe Lopes
Intelligence-Driven Incident Response
Google Chronicle logo.

Chronicle SIEM: Insights and Challenges Explored

Chronicle features and challenges in Threat Detection.

· 12min · Joe Lopes
Chronicle SIEM: Insights and Challenges Explored
Google Sheets logo.

Portfolio Tracker: Mastering your Finances

Better portfolio management with this powerful spreadsheet.

· 17min · Joe Lopes
Portfolio Tracker: Mastering your Finances
Google Sheets logo.

Handling Floating Point Precision in Spreadsheets

Handling floating point precision in spreadsheets effectively.

· 3min · Joe Lopes
Handling Floating Point Precision in Spreadsheets
Cyberpunk network machine gun.

Effective Detection Rules for Net and Port Scans

Effective network and port scan detection.

· 7min · Joe Lopes
Effective Detection Rules for Net and Port Scans
An image of a secure envelope.

Hardening Email with DKIM, SPF, DMARC

Learn how to protect your mailboxes from cyber threats.

· 5min · Joe Lopes
Hardening Email with DKIM, SPF, DMARC
An AI writer robot assistant.

Using GPT-3.5 for SEO Advice

Using OpenAI's GPT-3 to generate SEO-friendly post metadata.

· 8min · Joe Lopes
Using GPT-3.5 for SEO Advice
Data leaking from a cyber vault.

Export and Decode GAuth 2FA Accounts

How to export and decode GAuth 2FA.

· 3min · Joe Lopes
Export and Decode GAuth 2FA Accounts
A cyber vault.

Using AWS Secrets Manager in Your Scripts

Learn to authenticate in tools seamlessly.

· 4min · Joe Lopes
Using AWS Secrets Manager in Your Scripts
A cloud on fire.

Getting Started with CloudFlare for Web Protection

Use CloudFlare’s free plan for better site security.

· 4min · Joe Lopes
Getting Started with CloudFlare for Web Protection
A robot signing multiple documents.

Updating Signed Documents with GPG

Update GPG signed docs: import keys, patch files in batch.

· 4min · Joe Lopes
Updating Signed Documents with GPG
Google Sheets logo.

Getting Cryptocurrency Prices in Google Sheets

Retrieve crypto prices in Sheets using a 3rd party service.

· 4min · Joe Lopes
Getting Cryptocurrency Prices in Google Sheets
Illustration of cyberpunk air defense drones.

Automating Incident Response

Tackling log centralization, SIEM, and IR automation.

· 9min · Joe Lopes
Automating Incident Response
Illustration of a chess board made of wood.

The Importance of Logging Strategy

Streamlined planning and retention practices for better logging.

· 5min · Joe Lopes
The Importance of Logging Strategy
Illustration of a cyberpunk chess game.

Friction Between Red Teams and Incident Response

Reducing friction in Red Team cybersecurity exercises.

· 7min · Joe Lopes
Friction Between Red Teams and Incident Response
Apple logo.

My Minimalistic Approach to Mac System Setup

Set up your Mac with fewer apps for a simpler system.

· 4min · Joe Lopes
My Minimalistic Approach to Mac System Setup
Illustration of a global reputation system.

Query Security Services for IP Reputation

Query three security services for IP reputation in one script.

· 4min · Joe Lopes
Query Security Services for IP Reputation
Imagined logo of Zola.

Changing the Zola Theme

How to change your Zola blog theme without breaking the site.

· 6min · Joe Lopes
Changing the Zola Theme
Arch Linux logo.

Creating a Hardened Testing Environment

Install and secure Arch Linux for safer network tests.

· 3min · Joe Lopes
Creating a Hardened Testing Environment
Arch Linux logo.

Set Static IP Address in Arch Linux

Set a static IP in Arch Linux without DHCP support.

· 3min · Joe Lopes
Set Static IP Address in Arch Linux
Arch Linux logo.

Recovering Arch Linux from a PAM Issue

How to recover Arch with a misconfigured PAM configuration.

· 4min · Joe Lopes
Recovering Arch Linux from a PAM Issue
Illustration of a cyberpunk password safe.

Secure and Easy Password and MFA Management

Enhance passwords and MFA for better security and usability.

· 10min · Joe Lopes
Secure and Easy Password and MFA Management
Illustration of a big log decomposed.

Calculating and Decomposing Syslog Priority

Calculate and decompose Syslog message priority.

· 2min · Joe Lopes
Calculating and Decomposing Syslog Priority
Illustration of logs flowing like a river.

Real-time Log Forwarding with Python and Syslog

Create a smart log forwarding script using Python and Syslog.

· 3min · Joe Lopes
Real-time Log Forwarding with Python and Syslog