LLM SATs FTW
Practical experiments using LLMs for Structured Analytic Techniques in threat intelligence analysis.
Security Talks in 2025
Modern security presentation development using Markdown, Slidev, and AI tools for efficient workflows.
Effective Tagging in Synapse
Essential tagging patterns and best practices for Synapse threat intelligence platform workflows.
The Difficulty of Saying Nothing
Like everyone else I’ve been following the tragic war in Ukraine and mourning the loss of life and humanitarian crisis. Professionally as an analyst in the threat intelligence and computer network defense world I’ve been considering what this war and spillover means for defending networks, especially as organizations like CISA keep putting out bulletins regarding threats of Russian nexus adversaries.
Getting Started with Synapse
Complete beginner guide to installing and using Synapse threat intelligence platform with practical examples.
Burnt TIPs
Analysis of threat intelligence sharing challenges using culinary metaphors and community dynamics.
Blogging Again in 2021
Rebuilding a cybersecurity blog with modern open-source tools for speed, privacy, and control.
zsh for Rational Mortals
Practical guide to switching from bash to zsh with setup tips and configuration recommendations.
Building Better Security Presentations
Step-by-step process for building effective security presentations with focus on design and delivery.
Crash Override Chronicles: Victim
Victim Sites & Technology So all of those things were term or bits about generalized grid operations.