![Joe Lopes](https://lopes.id/./images/photo-avatar-joe-lopes.jpg)
Joe Lopes
![cover](https://lopes.id/images/graphic-book-practical-thread-de.jpg)
Practical Threat Detection Engineering
Review of Practical Threat Detection Engineering book.
![cover](https://lopes.id/images/graphic-logo-google-chronicle.png)
Auto-Cleaning Lists in Chronicle SIEM
Automate list maintenance in Chronicle SIEM by removing expired entries.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-spider-netadmin.jpg)
Endpoint Security Reflections feat. EDR and EDR-like Tools
Exploring the pros and cons of EDR and alternative endpoint solutions.
![cover](https://lopes.id/images/graphic-logo-misp.png)
Integrating MISP with Chronicle SIEM
Streamline the integration between CTI and CSIRT in an automated and efficient way.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-myth-buster.jpg)
Debunking Threat Detection Myths
Challenging myths in threat detection analytics for enhanced security operations.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-finger-screen.jpg)
How to Sign Commits in Git(Hub)
Secure Git commits with cryptography and make your repositories more reliable.
![cover](https://lopes.id/images/graphic-logo-google-sheets.png)
Portfolio Tracker v4
Revamped my Portfolio Tracker with multi-wallet support and improved allocation.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-cooker-octopus.jpg)
Improving SecOps Beyond Tuning Analytics
![cover](https://lopes.id/images/photo-cliff-stoll.jpg)
The Cuckoo's Egg
A 1980s Infosec thriller with groundbreaking investigations.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-thinking-atop-building.jpg)
The Threat Detection Fundamental Dilemma
Exploring the dilemma in threat detection: Precision vs. Recall for analytics.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-robot-fixing-car.jpg)
A Little Hardening with Burp
How I used Burp to improve this blog's security.
![cover](https://lopes.id/images/graphic-logo-mitre-attack.jpg)
MITRE ATT&CK 101: Bridging the Gap
Guide to MITRE ATT&CK with history and context for better usage.
![cover](https://lopes.id/images/illustration-ai-compass-integrated-circuit.jpg)
Testing The Logfile Navigator
Exploring log analysis with lnav tool: challenges, insights, and tips.
![cover](https://lopes.id/images/graphic-logo-mitre-attack.jpg)
Getting Real About MITRE ATT&CK
Understanding MITRE ATT&CK and using it in your favor.
![cover](https://lopes.id/images/illustration-ai-watercolor-engineer-planning-house.jpg)
Insights into Effective SIEM Deployment
Strategies and tips for successful SIEM deployment.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-cyborg-blueprint.jpg)
Mastering your Performance
Tools, rituals, and reflections for professional growth in Infosec.
Understanding Severity and Priority
Uncover optimal Detection Rule settings for consistent, efficient alerts.
Productivity Unleashed
Seamless productivity with tools and a process for better organization.
![cover](https://lopes.id/images/graphic-book-intel-driven-ir.jpg)
Intelligence-Driven Incident Response
Discover how integrating CTI enhances Threat Detection and CSIRT.
![cover](https://lopes.id/images/graphic-logo-google-chronicle.png)
Chronicle SIEM: Insights and Challenges Explored
Features and challenges in a review centered around Threat Detection.
![cover](https://lopes.id/images/graphic-logo-google-sheets.png)
Portfolio Tracker: Mastering your Finances
Enhance your portfolio management with this free and powerful spreadsheet.
![cover](https://lopes.id/images/graphic-logo-google-sheets.png)
Handling Floating Point Precision in Spreadsheets
Effective methods to handle floating point precision in spreadsheets.
Effective Detection Rules for Net and Port Scans
Effective network and port scan detection.
Hardening Email with DKIM, SPF, DMARC
Learn how to protect your mailboxes from cyber threats.
Using GPT-3.5 for SEO Advice
Using OpenAI's GPT-3 to generate SEO-friendly post metadata.
Export and Decode GAuth 2FA Accounts
How to export and decode GAuth 2FA.
Using AWS Secrets Manager in Your Scripts
Learn to authenticate in tools seamlessly.
Getting Started with CloudFlare for Web Protection
Use CloudFlare's free plan on personal sites for better security.
Updating Signed Documents with GPG
Update GPG signed documents, from key import to patching files in batch.
![cover](https://lopes.id/images/graphic-logo-google-sheets.png)
Getting Cryptocurrency Prices in Google Sheets
Get minor cryptocurrency prices in Google Sheets using 3rd party service.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-air-defense-drones.jpg)
Automating Incident Response
Tackling log centralization, SIEM operationalization, and IR automation.
The Importance of Logging Strategy
Streamlined planning and retention practices for better logging.
![cover](https://lopes.id/images/illustration-ai-cyberpunk-chess-red-blue.jpg)
Friction Between Red Teams and Incident Response
Avoidable friction between cybersecurity teams during Red Team exercises.
My Minimalistic Approach to Mac System Setup
Learn how to setup your Mac system with fewer apps and keep it simple.
Query Security Services for IP Reputation
Query three security services in one shell script to check IP reputation.
Changing the Zola Theme
Valuable tips on changing your Zola blog theme without breaking the site.
Creating a Hardened Testing Environment
Install and harden Arch Linux to create a safer OS for network tests.
![cover](https://lopes.id/images/graphic-logo-archlinux.png)
Set Static IP Address in Arch Linux
Learn how to set a static IP address in Arch Linux without DHCP support.
![cover](https://lopes.id/images/graphic-logo-archlinux.png)
Recovering Arch Linux from a PAM Issue
How to recover Arch with a misconfigured PAM configuration.
Secure and Easy Password and MFA Management
Manage your passwords and MFA tools to maximize security and usability.
Calculating and Decomposing Syslog Priority
Calculate and decompose Syslog message priority.
Real-time Log Forwarding with Python and Syslog
Create a smart log forwarding script using Python and Syslog.
![cover](https://lopes.id/images/graphic-logo-aws-security-specialty.jpg)
AWS Certified Security - Specialty Review
The materials and strategy I used to get this certification.
Logging Python Messages to Syslog in macOS
Send log messages from Python to Syslog in macOS.
![cover](https://lopes.id/images/graphic-logo-isc2-cissp.png)
My Journey to CISSP Certification
My experience getting the CISSP certification.
![cover](https://lopes.id/images/graphic-logo-archlinux.png)
Installing Nerd Fonts on Arch Linux
Learn how to install and use Nerd Fonts.
![cover](https://lopes.id/images/graphic-logo-archlinux.png)
Arch Linux Workstation Setup
Install graphical environment and apps, setup configs in your workstation.
![cover](https://lopes.id/images/graphic-logo-archlinux.png)
Linux Hardening with CIS Controls
Applying CIS controls for improving the security of an Arch Linux.
![cover](https://lopes.id/images/graphic-logo-archlinux.png)
Arch Linux Hardened Installation Guide
Step-by-step guide to perform a hardened Arch Linux installation.
Blogging and the Freedom of the Web
Blogging remains a valuable platform for tech content.