Posts
All posts from William Zujkowski - security insights, AI/ML projects, and career development
Securing Your Personal AI/ML Experiments: A Practical Guide
Lessons learned from running LLMs and AI experiments at home while keeping data and systems secure
From IT Support to Senior InfoSec Engineer: My 15+ Year Journey
The winding path from fixing printers to securing federal systems – lessons learned, mistakes made, and advice for aspiring security professionals
Raspberry Pi Security Projects That Actually Solve Problems
From network monitoring to physical security – practical Raspberry Pi projects that enhance your home security without breaking the bank
Continuous Learning in Cybersecurity: Strategies That Work
How I stay current in a field that changes daily – practical strategies for continuous learning without burning out
Automating Home Network Security with Python and Open Source Tools
Practical automation scripts and tools I've built to keep my home network secure without constant manual intervention
Building My Digital Garden with Eleventy
Why I chose Eleventy for my personal site and the journey of building a fast, accessible, and privacy-respecting digital home
Quantum Computing's Leap Forward
Witnessing IBM's quantum computer solve a problem in minutes that would take classical computers millennia convinced me we're on the brink of a computational revolution - and a security crisis
Multimodal Foundation Models: Capabilities, Challenges, and Applications
The first time I watched an AI analyze a screenshot and write working code based on the UI mockup, I realized we'd crossed into a new era of human-AI collaboration
Sustainable Computing: Strategies for Reducing IT's Carbon Footprint
Discovering that our ML training runs were consuming as much electricity as a small town sparked my journey into sustainable computing - efficiency became an environmental imperative, not just an optimization
Zero Trust Architecture: A Practical Implementation Guide
Moving from 'trust but verify' to 'never trust, always verify' required dismantling years of security assumptions and rebuilding our entire authentication and authorization framework