Posts
All posts from William Zujkowski - security insights, AI/ML projects, and career development
Securing Your Personal AI/ML Experiments: A Practical Guide
Secure personal AI experiments with model isolation and network segmentation—protect LLM deployments using privacy controls and threat modeling.
From IT Support to Senior InfoSec Engineer: My 15+ Year Journey
Navigate IT support to senior InfoSec engineer path—learn from 15+ years securing federal systems with practical career transition advice.
Raspberry Pi Security Projects That Actually Solve Problems
Build Raspberry Pi security projects with Pi-hole, VPN gateway, and honeypots—deploy practical network monitoring and threat detection on budget hardware.
Continuous Learning in Cybersecurity: Strategies That Work
Master continuous cybersecurity learning with lab exercises, research tracking, and community engagement—stay current without burnout.
Automating Home Network Security with Python and Open Source Tools
Automate home network security with Python and Ansible—deploy patching, threat detection, and compliance scanning for homelab infrastructure.
LLM-Powered Security Alert Triage with Local Models
Automate security alert analysis using local LLMs (Ollama) for privacy-preserving incident response. Reduce alert fatigue with AI-powered triage without cloud dependencies.
Privacy-Preserving AI Training Across My Homelab: Federated Learning with Granular-Ball Computing
Deploy federated learning across homelab with granular-ball computing—train privacy-preserving models with 82% reduced network transfer.
Building My Digital Garden with Eleventy
Build privacy-respecting sites with Eleventy—create fast, accessible static websites with zero tracking and excellent Core Web Vitals.
GPU Power Monitoring in My Homelab: When Machine Learning Met My Electricity Bill
Monitor GPU power with NVIDIA SMI and Grafana dashboards—reduce ML training electricity costs by 40% using optimization strategies for RTX 3090.
Blockchain Beyond Cryptocurrency: Building the Trust Layer of the Internet
Deploy blockchain beyond cryptocurrency with Ethereum and smart contracts—build decentralized trust for supply chain and identity verification.