Home

Blog

Writing about cybersecurity, AI systems, and lessons from building things.

Multimodal AI: Combining Vision, Voice, and Text in One Agent
Latest Article

Multimodal AI: Combining Vision, Voice, and Text in One Agent

Architectural patterns for building AI assistants that process camera feeds, voice commands, and text prompts simultaneously, with lessons from building Fixr and Khan OS.

Feb 8, 202611 min read
AIMultimodalComputer Vision
How AI is Transforming Penetration Testing

How AI is Transforming Penetration Testing

From automated recon to intelligent vulnerability prioritization, exploring how agentic AI systems like Aegis Intelligence are reshaping offensive security workflows.

Jan 2211 min read
AIPenetration Testing
Understanding DDoS Attacks on Financial Institutions

Understanding DDoS Attacks on Financial Institutions

Deep dive into attack vectors, amplification techniques, and layered mitigation strategies for protecting financial infrastructure from volumetric and application-layer DDoS attacks.

Dec 1510 min read
CybersecurityDDoS
Building Secure Authentication Systems from Scratch

Building Secure Authentication Systems from Scratch

A practical guide to implementing multifactor authentication with TOTP, secure password hashing using bcrypt, and defense against brute force and credential stuffing attacks.

Nov 208 min read
AuthenticationSecurity
AI in Cybersecurity: Detecting Network Anomalies

AI in Cybersecurity: Detecting Network Anomalies

How machine learning models trained on network telemetry can identify zero-day threats, lateral movement, and data exfiltration in real-time enterprise environments.

Oct 1012 min read
AIMachine Learning
Full Stack Development for Hackathons: Lessons from NASA Space Apps

Full Stack Development for Hackathons: Lessons from NASA Space Apps

Key strategies for rapid prototyping under pressure: choosing the right stack, dividing frontend and backend work, and shipping a working demo in 24 hours.

Sep 57 min read
HackathonFull Stack
Zero Trust Architecture: Beyond the Perimeter

Zero Trust Architecture: Beyond the Perimeter

Why traditional perimeter-based security fails in cloud-native environments and how zero trust principles, micro-segmentation, and continuous verification create resilient defense.

Aug 1813 min read
Zero TrustNetwork Security
From Help Desk to Cybersecurity: Building an IT Career Path

From Help Desk to Cybersecurity: Building an IT Career Path

How hands-on IT support experience at DePaul became the foundation for a cybersecurity career, including tips on certifications, lab projects, and transitioning from Tier 1 to security roles.

Jun 208 min read
CareerIT Support