Skip to main content

Posts

2025

The Limits of Automation: Where Human Judgment Still Beats AI in Security Auditing
·5 mins
Strategy Security AI
The Explainability Dilemma: Can We Trust AI to Make Security Decisions?
·5 mins
AI Security Ethics
Beyond the Hype: What 'Agentic AI' Actually Means for a Security Analyst
·5 mins
AI Security Strategy
What My Master's Thesis on DORA Taught Me About the Gap Between Developers and Lawyers
·5 mins
Strategy Security Culture
How I Built a Hybrid CI/CD Pipeline for My Portfolio and Blog
·5 mins
Tutorial DevOps
A Practical Guide: Building a Simple Compliance Scanner for AWS with Python
·6 mins
Tutorial Security DevOps

2024

DORA Is Coming: 3 AWS Misconfigurations Your FinTech Needs to Fix Now
·6 mins
Security Compliance
From Checkbox to Code: Why 'Compliance-as-Code' is the Future of GRC
·5 mins
Strategy Security DevOps
Building My First SOC Home Lab: From Zero to Threat Hunting
·6 mins
Tutorial Security HomeLab
A Digital Detective's Guide: A Forensic Analysis of WhatsApp on Desktop
·5 mins
Tutorial Forensics Security
The 5 Pillars of a Modern National Cyber Security Strategy
·4 mins
Strategy Security Policy
Why HTTPS Isn't Enough: A Practical Look at Confidentiality and Integrity
·4 mins
Tutorial Security Fundamentals
Correlating Network and Host Evidence: Investigating a Server Compromise
·5 mins
CaseStudy Forensics IncidentResponse

2023

Pen-Testing 101: From Nmap Scan to Meterpreter Shell
·5 mins
Tutorial Security Hacking
Peeking Inside an Android App: A Forensic Look at Discord Data
·5 mins
Tutorial Forensics MobileSecurity
An Introduction to File Carving: Recovering Data from a Disk Image
·5 mins
Tutorial Forensics

2022

Designing a Database for a FinTech App: A Bachelor's Thesis Case Study
·5 mins
Case Study Databases