Tagged 'security'
All posts tagged with 'security' on William Zujkowski's blog
Posts tagged "security"
29 posts tagged with security
Building a Privacy-First AI Lab: Deploying Local LLMs Without Sacrificing Ethics
My RTX 3090 runs Llama 3.1 70B locally, but 'local' doesn't automatically mean 'private.' After discovering unexpected network traffic from Ollama, I rebuilt my AI lab with real privacy controls.
Preparing Your Homelab for the Quantum Future: Post-Quantum Cryptography Migration
Preparing my homelab for the quantum threat with NIST's post-quantum algorithms—CRYSTALS-Kyber, CRYSTALS-Dilithium, and practical implementation lessons
Automated Security Scanning Pipeline with Grype and OSV
Building automated security scanning pipelines with Grype, OSV, and Trivy—CI/CD integration, vulnerability tracking, and actionable reporting
Building a Smart Vulnerability Prioritization System with EPSS and CISA KEV
Moving beyond CVSS scores to prioritize vulnerabilities using EPSS probability metrics and CISA KEV catalog for risk-based patch management
IoT Security in Your Home Lab: Lessons from OWASP IoTGoat
Explore IoT security vulnerabilities hands-on with OWASP IoTGoat—testing firmware extraction, API exploitation, and building secure IoT lab environments
Building Your Own MITRE ATT&CK Threat Intelligence Dashboard
Create a personal threat intelligence dashboard using MITRE ATT&CK framework, open-source feeds, and Python to track relevant threats to your environment.
Implementing Zero Trust Microsegmentation with VLANs
How I implemented zero trust principles using VLAN segmentation on my homelab - practical network security beyond simple firewall rules
Self-Hosted Password Manager Migration: Bitwarden Deep Dive
Migrating from cloud password managers to self-hosted Bitwarden: setup, security hardening, backup strategies, and why I made the switch
Building a Network Traffic Analysis Lab with Suricata
Setting up Suricata IDS/IPS on homelab for real-time network threat detection—rule management, performance tuning, and integrating with security stack
Container Security Hardening in My Homelab
Practical container security hardening techniques for Docker and K3s in a homelab environment, from base image selection to runtime security monitoring
Vulnerability Management at Scale with Open Source Tools
Build an enterprise-grade vulnerability management program using only open source tools. From scanning to remediation tracking, here's how to do it right
Implementing DNS-over-HTTPS (DoH) for Home Networks
Complete guide to deploying DNS-over-HTTPS on home networks for privacy and security, covering Pi-hole, dnscrypt-proxy, and multiple implementation approaches
eBPF for Security Monitoring: A Practical Guide
Using eBPF for real-time Linux security monitoring—syscall tracking, network observability, and production-ready patterns for kernel-level visibility
Local LLM Deployment: Privacy-First Approach
Complete guide to running LLMs locally for privacy: hardware requirements, model selection, optimization techniques, and practical deployment strategies
Building a Security-Focused Homelab: My Journey
How I built a comprehensive security lab at home for learning and experimentation—covering Proxmox, VLANs, IDS/IPS, and keeping my family's data safe
Securing Your Personal AI/ML Experiments: A Practical Guide
Lessons from running LLMs and AI experiments at home while keeping data secure, covering model isolation, network segmentation, and privacy controls
From IT Support to Senior InfoSec Engineer: My 15+ Year Journey
The winding path from fixing printers to securing federal systems over 10 years—lessons learned, mistakes made, and advice for aspiring security professionals
Raspberry Pi Security Projects That Actually Solve Problems
From network monitoring to physical security—practical Raspberry Pi security projects like Pi-hole, VPN gateway, and honeypots without breaking the bank
Continuous Learning in Cybersecurity: Strategies That Work
How I stay current in a field that changes daily—practical strategies including lab exercises, research tracking, and community engagement without burnout
Automating Home Network Security with Python and Open Source Tools
Automation scripts and tools I built to keep my home network secure, including Ansible playbooks, Python monitors, and automated patching systems
Blockchain Beyond Cryptocurrency: Building the Trust Layer of the Internet
Running Ethereum nodes on my homelab taught me blockchain is about building trust without central authorities. Here's what works (and doesn't)
Zero Trust Architecture: A Practical Implementation Guide
Practical guide to implementing zero trust architecture: identity verification, micro-segmentation, and continuous monitoring for modern security
Large Language Models for Smart Contract Security: Promise and Limitations
Can LLMs detect smart contract vulnerabilities? Testing GPT-4 and Claude against known exploits with surprising results and security implications
Preparing for the Quantum Leap: A Guide to Quantum-Resistant Cryptography
Quantum computers threaten today's encryption. Implementing NIST's post-quantum cryptographic algorithms to future-proof security infrastructure
Implementing Zero Trust Security: Never Trust, Always Verify
Zero trust security assumes breach and verifies everything. My journey implementing these principles in a homelab environment with practical examples
The Deepfake Dilemma: Navigating the Threat of AI-Generated Deception
AI-generated deepfakes threaten truth itself. Exploring detection techniques, authentication methods, and the arms race between creation and detection
Securing the Cloud-Native Frontier: A Guide to Cloud-Native Security
Securing cloud-native environments requires new approaches—container security, service mesh, secrets management, and zero trust for microservices
Demystifying Cryptography: A Beginner's Guide to Encryption, Hashing, and Digital Signatures
Breaking down cryptography fundamentals—symmetric/asymmetric encryption, hashing, digital signatures—with practical examples and implementation guidance
Writing Secure Code: A Developer's Guide to Thwarting Security Exploits
Practical guide to writing secure code from the start: input validation, parameterized queries, secrets management, and secure architecture patterns