Tagged 'security'
All posts tagged with 'security' on William Zujkowski's blog
Posts tagged "security"
39 posts tagged with security
Building a Private Cloud in Your Homelab with Proxmox and Security Best Practices
Learn to build and secure a production-grade private cloud using Proxmox VE. Covers network segmentation, backup strategies, security hardening, and resource management with real homelab implementation lessons.
Hardening Docker Containers in Your Homelab: A Defense-in-Depth Approach
Eight security layers that stopped real attacks in homelab testing: minimal base images, user namespaces, seccomp profiles, network segmentation, and more. Defense-in-depth without Kubernetes overhead.
Building a Homelab Security Dashboard with Grafana and Prometheus
Real-world guide to monitoring security events in your homelab. Covers Prometheus configuration, Grafana dashboards, and alerting rules for threat detection.
NodeShield: Runtime SBOM Enforcement Stops 98% of Supply Chain Attacks
NodeShield enforces SBOMs at runtime using CBOM policies to prevent supply chain attacks. Homelab Docker deployment guide with attack simulations, 98.3% prevention rate, and <1ms overhead.
SIEM for Homelab: Wazuh vs Graylog Performance Comparison
Deploy and benchmark Wazuh and Graylog SIEM solutions in your homelab. Performance analysis, resource usage, and integration patterns for security monitoring.
Building a Privacy-First AI Lab: Deploying Local LLMs Without Sacrificing Ethics
Build privacy-first AI lab with local LLMs—run models up to 34B on RTX 3090 (24GB VRAM) with network isolation, traffic monitoring, and real privacy controls.
Preparing Your Homelab for the Quantum Future: Post-Quantum Cryptography Migration
Implement post-quantum cryptography with CRYSTALS-Kyber and Dilithium—prepare homelab for quantum threats using NIST-approved algorithms.
Automated Security Scanning Pipeline with Grype and OSV
Build automated security scanning pipelines with Grype, OSV, and Trivy—integrate vulnerability detection into CI/CD workflows with actionable reporting.
Building a Smart Vulnerability Prioritization System with EPSS and CISA KEV
Prioritize vulnerabilities with EPSS and CISA KEV catalog—move beyond CVSS scores to risk-based patch management using exploitation probability metrics.
IoT Security in Your Home Lab: Lessons from OWASP IoTGoat
Test IoT security with OWASP IoTGoat—practice firmware extraction, API exploitation, and hardware hacking in secure lab environments.
Building Your Own MITRE ATT&CK Threat Intelligence Dashboard
Build MITRE ATT&CK threat intelligence dashboard with Python—track adversary tactics and techniques using open-source threat feeds.
Implementing Zero Trust Microsegmentation with VLANs
Implement zero trust with VLAN segmentation—secure homelab networks using micro-segmentation and layer 3 firewalls for defense in depth.
Self-Hosted Password Manager Migration: Bitwarden Deep Dive
Migrate to self-hosted Bitwarden—deploy secure vault with backup strategies, SSL certificates, and database encryption for full control.
Building a Network Traffic Analysis Lab with Suricata
Deploy Suricata IDS/IPS for real-time network threat detection—configure rule management, performance tuning, and SIEM integration for homelab monitoring.
Docker Runtime Security Hardening with Linux Security Modules
Harden Docker containers using AppArmor and SELinux for isolation without orchestration overhead. LSM profiles, seccomp filters, and capability dropping at homelab scale.
Vulnerability Management at Scale with Open Source Tools
Build enterprise vulnerability management with open source—deploy scanning, remediation tracking, and compliance using Nessus and OpenVAS.
Implementing DNS-over-HTTPS (DoH) for Home Networks
Deploy DNS-over-HTTPS with Pi-hole and dnscrypt-proxy—encrypt DNS queries for home network privacy and prevent ISP monitoring with DoH implementation.
eBPF for Security Monitoring: A Practical Guide
Implement eBPF security monitoring for real-time kernel visibility—track syscalls and network activity with production-ready patterns for threat detection.
Local LLM Deployment: Privacy-First Approach
Deploy local LLMs for privacy-first AI—run language models on homelab hardware with model selection, optimization, and deployment strategies.
Building a Security-Focused Homelab: My Journey
Build security-focused homelab with Proxmox, VLANs, and IDS/IPS—create testing environment for cybersecurity and family data protection.
Securing Your Personal AI/ML Experiments: A Practical Guide
Secure personal AI experiments with model isolation and network segmentation—protect LLM deployments using privacy controls and threat modeling.
From IT Support to Senior InfoSec Engineer: My 15+ Year Journey
Navigate IT support to senior InfoSec engineer path—learn from 15+ years securing federal systems with practical career transition advice.
Raspberry Pi Security Projects That Actually Solve Problems
Build Raspberry Pi security projects with Pi-hole, VPN gateway, and honeypots—deploy practical network monitoring and threat detection on budget hardware.
Continuous Learning in Cybersecurity: Strategies That Work
Master continuous cybersecurity learning with lab exercises, research tracking, and community engagement—stay current without burnout.
Automating Home Network Security with Python and Open Source Tools
Automate home network security with Python and Ansible—deploy patching, threat detection, and compliance scanning for homelab infrastructure.
LLM-Powered Security Alert Triage with Local Models
Automate security alert analysis using local LLMs (Ollama) for privacy-preserving incident response. Reduce alert fatigue with AI-powered triage without cloud dependencies.
Blockchain Beyond Cryptocurrency: Building the Trust Layer of the Internet
Deploy blockchain beyond cryptocurrency with Ethereum and smart contracts—build decentralized trust for supply chain and identity verification.
Sandboxing Untrusted Containers with gVisor: Lessons from G-Fuzz Vulnerability Research
Secure containers with gVisor sandboxing—prevent kernel exploits in Kubernetes clusters while managing 59% startup overhead for untrusted workloads.
Zero Trust Architecture: A Practical Implementation Guide
Implement zero trust with identity verification and micro-segmentation—secure networks using never-trust-always-verify principles.
Zero-Knowledge Proof Authentication for Homelab Services
Implement privacy-preserving authentication using ZK-SNARKs for homelab SSO. No passwords transmitted, cryptographic proof of identity without revealing credentials.
Large Language Models for Smart Contract Security: Promise and Limitations
Test LLM smart contract security with GPT-4 and Claude—achieve 80% reentrancy detection accuracy but manage 38% false positives in production workflows.
AI: The New Frontier in Cybersecurity – Opportunities and Ethical Dilemmas
Deploy AI-powered cybersecurity with automated threat detection—achieve 73% accuracy in anomaly detection catching attacks SIEM systems miss.
Quantum Computing and Defense: The Double-Edged Sword of Tomorrow's Technology
Prepare for quantum computing threats with post-quantum cryptography—protect RSA and ECC encryption from quantum attacks using NIST-approved algorithms.
Preparing for the Quantum Leap: A Guide to Quantum-Resistant Cryptography
Implement quantum-resistant cryptography with NIST post-quantum algorithms. Future-proof encryption against quantum attacks using Kyber and Dilithium.
Implementing Zero Trust Security: Never Trust, Always Verify
Deploy zero trust security with continuous verification and identity-centric controls—implement never-trust-always-verify for Federal EO 14028 compliance.
The Deepfake Dilemma: Navigating the Threat of AI-Generated Deception
Detect AI-generated deepfakes with neural network analysis and authentication methods—combat misinformation with 73% accuracy detection models.
Building a Python Vulnerability Scanner with NVD API Integration
Automate vulnerability detection in your homelab using Python and the National Vulnerability Database API. Track CVEs, scan dependencies, and integrate with monitoring systems.
Demystifying Cryptography: A Beginner's Guide to Encryption, Hashing, and Digital Signatures
Learn cryptography fundamentals with AES-256, RSA, and SHA-3—implement encryption, hashing, and digital signatures for production security systems.
Writing Secure Code: A Developer's Guide to Thwarting Security Exploits
Master secure code development with input validation, parameterized queries, and secrets management—prevent SQL injection and XSS in production systems.