Posts
All posts from William Zujkowski - security insights, AI/ML projects, and career development
From Claude in Your Terminal to Robots in Your Workshop: The Embodied AI Revolution
Deploy Vision-Language-Action models for embodied AI robots—integrate physical world interaction with security considerations for homelab automation.
Automated Security Scanning Pipeline with Grype and OSV
Build automated security scanning pipelines with Grype, OSV, and Trivy—integrate vulnerability detection into CI/CD workflows with actionable reporting.
Proxmox High Availability Setup for Homelab Reliability
Build Proxmox high-availability clusters with shared storage and automated failover—implement live migration for zero-downtime homelab maintenance.
Building a Smart Vulnerability Prioritization System with EPSS and CISA KEV
Prioritize vulnerabilities with EPSS and CISA KEV catalog—move beyond CVSS scores to risk-based patch management using exploitation probability metrics.
IoT Security in Your Home Lab: Lessons from OWASP IoTGoat
Test IoT security with OWASP IoTGoat—practice firmware extraction, API exploitation, and hardware hacking in secure lab environments.
Building Your Own MITRE ATT&CK Threat Intelligence Dashboard
Build MITRE ATT&CK threat intelligence dashboard with Python—track adversary tactics and techniques using open-source threat feeds.
Implementing Zero Trust Microsegmentation with VLANs
Implement zero trust with VLAN segmentation—secure homelab networks using micro-segmentation and layer 3 firewalls for defense in depth.
Self-Hosted Password Manager Migration: Bitwarden Deep Dive
Migrate to self-hosted Bitwarden—deploy secure vault with backup strategies, SSL certificates, and database encryption for full control.
Building a Network Traffic Analysis Lab with Suricata
Deploy Suricata IDS/IPS for real-time network threat detection—configure rule management, performance tuning, and SIEM integration for homelab monitoring.
Docker Runtime Security Hardening with Linux Security Modules
Harden Docker containers using AppArmor and SELinux for isolation without orchestration overhead. LSM profiles, seccomp filters, and capability dropping at homelab scale.