Home

Blog

Writing about cybersecurity, AI systems, and lessons from building things.

Ransomware Defense: Prevention, Detection, and Recovery Strategies
Latest Article

Ransomware Defense: Prevention, Detection, and Recovery Strategies

A comprehensive guide to protecting organizations from ransomware attacks, covering backup strategies, endpoint detection, network segmentation, and incident response playbooks.

Feb 15, 202614 min read
RansomwareCybersecurityIncident Response
Multimodal AI: Combining Vision, Voice, and Text in One Agent

Multimodal AI: Combining Vision, Voice, and Text in One Agent

Architectural patterns for building AI assistants that process camera feeds, voice commands, and text prompts simultaneously, with lessons from building Fixr and Khan OS.

Feb 811 min read
AIMultimodal
How AI is Transforming Penetration Testing

How AI is Transforming Penetration Testing

From automated recon to intelligent vulnerability prioritization, exploring how agentic AI systems like Aegis Intelligence are reshaping offensive security workflows.

Jan 2211 min read
AIPenetration Testing
Web Application Security: OWASP Top 10 Deep Dive

Web Application Security: OWASP Top 10 Deep Dive

Practical analysis of the most critical web application security risks, with real-world examples, exploitation techniques, and secure coding practices to prevent each vulnerability.

Jan 515 min read
Web SecurityOWASP
Understanding DDoS Attacks on Financial Institutions

Understanding DDoS Attacks on Financial Institutions

Deep dive into attack vectors, amplification techniques, and layered mitigation strategies for protecting financial infrastructure from volumetric and application-layer DDoS attacks.

Dec 1510 min read
CybersecurityDDoS
Cloud Security Fundamentals: AWS, Azure, and GCP Security Controls

Cloud Security Fundamentals: AWS, Azure, and GCP Security Controls

Understanding shared responsibility models, identity and access management, network security groups, and encryption in major cloud platforms.

Dec 112 min read
Cloud SecurityAWS
Building Secure Authentication Systems from Scratch

Building Secure Authentication Systems from Scratch

A practical guide to implementing multifactor authentication with TOTP, secure password hashing using bcrypt, and defense against brute force and credential stuffing attacks.

Nov 208 min read
AuthenticationSecurity
Day in the Life of a SOC Analyst: Tools, Workflows, and Alert Triage

Day in the Life of a SOC Analyst: Tools, Workflows, and Alert Triage

Inside look at Security Operations Center workflows, from initial alert triage to incident escalation, including essential tools like SIEM, SOAR, and threat intelligence platforms.

Nov 110 min read
SOCBlue Team
Introduction to Threat Hunting: Proactive Security Beyond Alerts

Introduction to Threat Hunting: Proactive Security Beyond Alerts

How to proactively search for threats that evade automated detection, including hypothesis-driven hunting methodologies, essential data sources, and practical hunting techniques.

Oct 2011 min read
Threat HuntingBlue Team
AI in Cybersecurity: Detecting Network Anomalies

AI in Cybersecurity: Detecting Network Anomalies

How machine learning models trained on network telemetry can identify zero-day threats, lateral movement, and data exfiltration in real-time enterprise environments.

Oct 1012 min read
AIMachine Learning
Full Stack Development for Hackathons: Lessons from NASA Space Apps

Full Stack Development for Hackathons: Lessons from NASA Space Apps

Key strategies for rapid prototyping under pressure: choosing the right stack, dividing frontend and backend work, and shipping a working demo in 24 hours.

Sep 57 min read
HackathonFull Stack
Zero Trust Architecture: Beyond the Perimeter

Zero Trust Architecture: Beyond the Perimeter

Why traditional perimeter-based security fails in cloud-native environments and how zero trust principles, micro-segmentation, and continuous verification create resilient defense.

Aug 1813 min read
Zero TrustNetwork Security
From Help Desk to Cybersecurity: Building an IT Career Path

From Help Desk to Cybersecurity: Building an IT Career Path

How hands-on IT support experience at DePaul became the foundation for a cybersecurity career, including tips on certifications, lab projects, and transitioning from Tier 1 to security roles.

Jun 208 min read
CareerIT Support