where others see logs, I see stories.
My journey migrating from Zola to Quarto.
Automate MITRE ATT&CK gap analysis combining Navigator layers.
Automate Chronicle SIEM Data Tables cleanup for expired rows.
The practical impact of the CISSP certification.
An educational Rust ransomware for security research.
Using LLMs as a learning tool for programming.
Rust language from a security engineer’s perspective.
A guide to map detection rules to MITRE ATT&CK.
Engineer threat detection rules: design, document, then code.
Reflections on blogging, ownership, and growth.
Review of Automating Security Detection Engineering book.
A deep dive into bug hunting with practical lessons.
Best practices and workflow tips from Git for Teams.
Guidelines for evaluating effective SOC detections.
Actionable detection for relevant and contextual alerts.
A guide to modern software engineering and career development.
Stuxnet and the launch of the world’s first digital weapon.
Final thoughts and improvements for the Nebula detection lab.
Elastic Stack deployment for log monitoring.
Setting up Wazuh for log collection and detection rules.
Easy guide to setting up a simple detection engineering lab.
Review of Practical Threat Detection Engineering book.
Automate Chronicle SIEM list cleanup for expired items.
Comparing EDR with alternative endpoint solutions.
Integrate CTI and CSIRT automatically and efficiently.
Debunking threat detection myths for improved SecOps.
Use cryptography to secure Git commits and boost reliability.
Version 4 of my portfolio tracker spreadsheet.
Improving SecOps through alert tuning, contextualization, and automation.
A 1980s Infosec thriller with groundbreaking investigations.
Exploring the precision vs. recall dilemma in threat detection.
How I used Burp to improve this blog’s security.
Guide to MITRE ATT&CK with history and context for better usage.
Log analysis with lnav: challenges, insights, and tips.
Understanding MITRE ATT&CK and using it in your favor.
Strategies and tips for successful SIEM deployment.
Tools, rituals, and reflections for growth in Infosec.
Find the best settings for consistent detection alerts.
Boost productivity with tools and a streamlined process.
How integrating CTI enhances Threat Detection and CSIRT.
Chronicle features and challenges in Threat Detection.
Better portfolio management with this powerful spreadsheet.
Handling floating point precision in spreadsheets effectively.
Effective network and port scan detection.
Learn how to protect your mailboxes from cyber threats.
Using OpenAI’s GPT-3 to generate SEO-friendly post metadata.
How to export and decode GAuth 2FA.
Learn to authenticate in tools seamlessly.
Use CloudFlare’s free plan for better site security.
Update GPG signed docs: import keys, patch files in batch.
Retrieve crypto prices in Sheets using a 3rd party service.
Tackling log centralization, SIEM, and IR automation.
Streamlined planning and retention practices for better logging.
Reducing friction in Red Team cybersecurity exercises.
Set up your Mac with fewer apps for a simpler system.
Query three security services for IP reputation in one script.
How to change your Zola blog theme without breaking the site.
Install and secure Arch Linux for safer network tests.
Set a static IP in Arch Linux without DHCP support.
How to recover Arch with a misconfigured PAM configuration.
Enhance passwords and MFA for better security and usability.
Calculate and decompose Syslog message priority.
Create a smart log forwarding script using Python and Syslog.
The materials and strategy I used to get this certification.
Send log messages from Python to Syslog in macOS.
My experience getting the CISSP certification.
Learn how to install and use Nerd Fonts.
Setup your Arch workstation with GUI and apps.
Applying CIS controls to secure Arch Linux.
Step-by-step guide for a hardened Arch Linux install.
Blogging remains a valuable platform for tech content.
Streamlining network management with IPAM and a network scanner.
Uma crônica sobre fazer cerveja artesanal no Brasil.
Gerencie submódulos no Git: comandos e referência.
Aprenda a criar um tema para Zola e contribua com a comunidade.
Preparação e dicas para a certificação Security+.
Importância das certificações na seleção de pessoal em TI.
Zola para criar e manter sites seguros e de alta performance.