Joe Lopes
Countdown to Zero Day
Stuxnet and the launch of the world's first digital weapon.
Project Nebula: Debriefing
Final thoughts and improvements for the Nebula detection lab.
Project Nebula: Detecting with Elastic
Elastic Stack deployment for log monitoring.
Project Nebula: Detecting with Wazuh
Setting up Wazuh for log collection and detection rules.
Project Nebula: Build a Simple Detection Lab
Easy guide to setting up a simple detection engineering lab.
Practical Threat Detection Engineering
Review of Practical Threat Detection Engineering book.
Auto-Cleaning Lists in Chronicle SIEM
Automate Chronicle SIEM list cleanup for expired items.
Endpoint Security Reflections feat. EDR
Comparing EDR with alternative endpoint solutions.
Integrating MISP with Chronicle SIEM
Integrate CTI and CSIRT automatically and efficiently.
Debunking Threat Detection Myths
Debunking threat detection myths for improved SecOps.
How to Sign Commits in Git(Hub)
Use cryptography to secure Git commits and boost reliability.
Portfolio Tracker v4
Version 4 of my portfolio tracker spreadsheet.
Improving SecOps Beyond Tuning Analytics
The Cuckoo's Egg
A 1980s Infosec thriller with groundbreaking investigations.
The Threat Detection Fundamental Dilemma
Exploring the precision vs. recall dilemma in threat detection.
A Little Hardening with Burp
How I used Burp to improve this blog's security.
MITRE ATT&CK 101: Bridging the Gap
Guide to MITRE ATT&CK with history and context for better usage.
Testing The Logfile Navigator
Log analysis with lnav: challenges, insights, and tips.
Getting Real About MITRE ATT&CK
Understanding MITRE ATT&CK and using it in your favor.
Insights into Effective SIEM Deployment
Strategies and tips for successful SIEM deployment.
Mastering your Performance
Tools, rituals, and reflections for growth in Infosec.
Understanding Severity and Priority
Find the best settings for consistent detection alerts.
Productivity Unleashed
Boost productivity with tools and a streamlined process.
Intelligence-Driven Incident Response
How integrating CTI enhances Threat Detection and CSIRT.
Chronicle SIEM: Insights and Challenges Explored
Chronicle features and challenges in Threat Detection.
Portfolio Tracker: Mastering your Finances
Better portfolio management with this powerful spreadsheet.
Handling Floating Point Precision in Spreadsheets
Handling floating point precision in spreadsheets effectively.
Effective Detection Rules for Net and Port Scans
Effective network and port scan detection.
Hardening Email with DKIM, SPF, DMARC
Learn how to protect your mailboxes from cyber threats.
Using GPT-3.5 for SEO Advice
Using OpenAI's GPT-3 to generate SEO-friendly post metadata.
Export and Decode GAuth 2FA Accounts
How to export and decode GAuth 2FA.
Using AWS Secrets Manager in Your Scripts
Learn to authenticate in tools seamlessly.
Getting Started with CloudFlare for Web Protection
Use CloudFlare’s free plan for better site security.
Updating Signed Documents with GPG
Update GPG signed docs: import keys, patch files in batch.
Getting Cryptocurrency Prices in Google Sheets
Retrieve crypto prices in Sheets using a 3rd party service.
Automating Incident Response
Tackling log centralization, SIEM, and IR automation.
The Importance of Logging Strategy
Streamlined planning and retention practices for better logging.
Friction Between Red Teams and Incident Response
Reducing friction in Red Team cybersecurity exercises.
My Minimalistic Approach to Mac System Setup
Set up your Mac with fewer apps for a simpler system.
Query Security Services for IP Reputation
Query three security services for IP reputation in one script.
Changing the Zola Theme
How to change your Zola blog theme without breaking the site.
Creating a Hardened Testing Environment
Install and secure Arch Linux for safer network tests.
Set Static IP Address in Arch Linux
Set a static IP in Arch Linux without DHCP support.
Recovering Arch Linux from a PAM Issue
How to recover Arch with a misconfigured PAM configuration.
Secure and Easy Password and MFA Management
Enhance passwords and MFA for better security and usability.
Calculating and Decomposing Syslog Priority
Calculate and decompose Syslog message priority.
Real-time Log Forwarding with Python and Syslog
Create a smart log forwarding script using Python and Syslog.
AWS Certified Security - Specialty Review
The materials and strategy I used to get this certification.
Logging Python Messages to Syslog in macOS
Send log messages from Python to Syslog in macOS.
My Journey to CISSP Certification
My experience getting the CISSP certification.