Posts
2025
The Limits of Automation: Where Human Judgment Still Beats AI in Security Auditing
·5 mins
Strategy
Security
AI
The Explainability Dilemma: Can We Trust AI to Make Security Decisions?
·5 mins
AI
Security
Ethics
Beyond the Hype: What 'Agentic AI' Actually Means for a Security Analyst
·5 mins
AI
Security
Strategy
What My Master's Thesis on DORA Taught Me About the Gap Between Developers and Lawyers
·5 mins
Strategy
Security
Culture
How I Built a Hybrid CI/CD Pipeline for My Portfolio and Blog
·5 mins
Tutorial
DevOps
A Practical Guide: Building a Simple Compliance Scanner for AWS with Python
·6 mins
Tutorial
Security
DevOps
2024
DORA Is Coming: 3 AWS Misconfigurations Your FinTech Needs to Fix Now
·6 mins
Security
Compliance
From Checkbox to Code: Why 'Compliance-as-Code' is the Future of GRC
·5 mins
Strategy
Security
DevOps
Building My First SOC Home Lab: From Zero to Threat Hunting
·6 mins
Tutorial
Security
HomeLab
A Digital Detective's Guide: A Forensic Analysis of WhatsApp on Desktop
·5 mins
Tutorial
Forensics
Security
The 5 Pillars of a Modern National Cyber Security Strategy
·4 mins
Strategy
Security
Policy
Why HTTPS Isn't Enough: A Practical Look at Confidentiality and Integrity
·4 mins
Tutorial
Security
Fundamentals
Correlating Network and Host Evidence: Investigating a Server Compromise
·5 mins
CaseStudy
Forensics
IncidentResponse
2023
Pen-Testing 101: From Nmap Scan to Meterpreter Shell
·5 mins
Tutorial
Security
Hacking
Peeking Inside an Android App: A Forensic Look at Discord Data
·5 mins
Tutorial
Forensics
MobileSecurity
An Introduction to File Carving: Recovering Data from a Disk Image
·5 mins
Tutorial
Forensics
2022
Designing a Database for a FinTech App: A Bachelor's Thesis Case Study
·5 mins
Case Study
Databases