
Multimodal AI: Combining Vision, Voice, and Text in One Agent
Architectural patterns for building AI assistants that process camera feeds, voice commands, and text prompts simultaneously, with lessons from building Fixr and Khan OS.

How AI is Transforming Penetration Testing
From automated recon to intelligent vulnerability prioritization, exploring how agentic AI systems like Aegis Intelligence are reshaping offensive security workflows.

Understanding DDoS Attacks on Financial Institutions
Deep dive into attack vectors, amplification techniques, and layered mitigation strategies for protecting financial infrastructure from volumetric and application-layer DDoS attacks.

Building Secure Authentication Systems from Scratch
A practical guide to implementing multifactor authentication with TOTP, secure password hashing using bcrypt, and defense against brute force and credential stuffing attacks.

AI in Cybersecurity: Detecting Network Anomalies
How machine learning models trained on network telemetry can identify zero-day threats, lateral movement, and data exfiltration in real-time enterprise environments.

Full Stack Development for Hackathons: Lessons from NASA Space Apps
Key strategies for rapid prototyping under pressure: choosing the right stack, dividing frontend and backend work, and shipping a working demo in 24 hours.

Zero Trust Architecture: Beyond the Perimeter
Why traditional perimeter-based security fails in cloud-native environments and how zero trust principles, micro-segmentation, and continuous verification create resilient defense.

From Help Desk to Cybersecurity: Building an IT Career Path
How hands-on IT support experience at DePaul became the foundation for a cybersecurity career, including tips on certifications, lab projects, and transitioning from Tier 1 to security roles.