Tagged 'security'
All posts tagged with 'security' on William Zujkowski's blog
Posts tagged "security"
20 posts tagged with security
Vulnerability Management at Scale with Open Source Tools
Build an enterprise-grade vulnerability management program using only open source tools. From scanning to remediation tracking, here's how to do it right
Implementing DNS-over-HTTPS (DoH) for Home Networks
Complete guide to deploying DNS-over-HTTPS on your home network for enhanced privacy and security, with multiple implementation approaches
eBPF for Security Monitoring: A Practical Guide
Learn how to leverage eBPF for real-time security monitoring in Linux environments with practical examples and production-ready patterns
Local LLM Deployment: Privacy-First Approach
Learn how to deploy Large Language Models locally for maximum privacy and security. Complete guide covering hardware requirements, model selection, and implementation strategies.
Building a Security Mindset: Lessons from the Field
After 15+ years in cybersecurity, here are the key lessons about developing a security-first mindset that have shaped my approach to both professional challenges and personal projects.
Building a Security-Focused Homelab: My Journey
How I built a comprehensive security lab at home for learning, experimentation, and keeping my family's digital life safe
Securing Your Personal AI/ML Experiments: A Practical Guide
Lessons learned from running LLMs and AI experiments at home while keeping data and systems secure
From IT Support to Senior InfoSec Engineer: My 15+ Year Journey
The winding path from fixing printers to securing federal systems – lessons learned, mistakes made, and advice for aspiring security professionals
Raspberry Pi Security Projects That Actually Solve Problems
From network monitoring to physical security – practical Raspberry Pi projects that enhance your home security without breaking the bank
Continuous Learning in Cybersecurity: Strategies That Work
How I stay current in a field that changes daily – practical strategies for continuous learning without burning out
Automating Home Network Security with Python and Open Source Tools
Practical automation scripts and tools I've built to keep my home network secure without constant manual intervention
Zero Trust Architecture: A Practical Implementation Guide
Moving from 'trust but verify' to 'never trust, always verify' required dismantling years of security assumptions and rebuilding our entire authentication and authorization framework
Large Language Models for Smart Contract Security: Promise and Limitations
Evaluating how LLMs are transforming smart contract vulnerability detection, their current capabilities versus traditional tools, and the most promising approaches for improving blockchain security.
Blockchain Beyond Cryptocurrency: Building the Trust Layer of the Internet
How blockchain technology has evolved beyond digital currencies to create distributed trust systems that are transforming supply chains, identity management, governance, and more.
Preparing for the Quantum Leap: A Guide to Quantum-Resistant Cryptography
The day I first understood how Shor's algorithm could break RSA encryption, I realized our entire security infrastructure might become obsolete overnight - preparing for that future became urgent
Implementing Zero Trust Security: Never Trust, Always Verify
How the shift from perimeter-based security to identity-centered Zero Trust architecture is transforming modern software development and why it's essential for today's distributed systems.
The Deepfake Dilemma: Navigating the Threat of AI-Generated Deception
The first time I saw a convincing deepfake video, I spent an hour researching to convince myself it wasn't real - that moment changed how I think about digital evidence forever
Securing the Cloud-Native Frontier: A Guide to Cloud-Native Security
The first time I deployed a microservices architecture to production, I thought our security was bulletproof - until a penetration tester showed me how they'd compromised three services in under an hour
Demystifying Cryptography: A Beginner's Guide to Encryption, Hashing, and Digital Signatures
Cryptography always felt like magic to me until I spent weeks trying to debug an SSL certificate issue - suddenly those mathematical incantations became very practical necessities
Writing Secure Code: A Developer's Guide to Thwarting Security Exploits
Years ago, I discovered a glaring SQL injection vulnerability in an internal application during a routine code review - that sinking feeling taught me that security isn't optional