-
Sep 9, 2025
Artificial Intelligence is everywhere. From smart assistants that finish our sentences, to chatbots that try to solve our problems (sometimes before we even know what the problem is), it all feels a bit magical. But there’s a tiny catch: sometimes… read more »
-
Sep 6, 2025
TL;DR In digital forensics and incident response, uncovering hidden artefacts often makes the difference between a stalled investigation and a break-through. One such powerful yet under-appreciated artefact is the USN Journal (Update Sequence Number Journal), an NTFS feature that quietly… read more »
-
Sep 4, 2025
Based on Anthropic’s August 2025 Threat Intelligence Report Cybersecurity is experiencing a seismic shift. Advanced Persistent Threat (APT) groups, those sophisticated nation-state and criminal actors we’ve grown accustomed to tracking through traditional methods, are now wielding artificial intelligence as their… read more »
-
Aug 22, 2025
Running a Security Operations Center is less about stacking tools and more about orchestrating your people. The effectiveness of a SOC heavily depends on how strategically its human resources are allocated. While technology and automation play crucial roles, building the… read more »
-
Aug 9, 2025
Light, practical and human: because practising your incident plan should feel like rehearsal, not punishment. What is a tabletop exercise (TTX)? A tabletop exercise is a facilitated, discussion-based rehearsal where people talk through a realistic incident scenario: no systems are… read more »
-
Aug 8, 2025
I remember the first time I heard about threat modeling. Someone described it to me as “sitting in a room, imagining all the ways your system could be destroyed.” That sounded… intense. I pictured a group of security folks in… read more »
-
Aug 5, 2025
A teenager armed with nothing but curiosity and a Discord account successfully infiltrates a multinational corporation worth billions. Meanwhile, that same corporation’s cybersecurity team consists entirely of professionals holding impressive certificates and decades of theoretical training. This isn’t a hypothetical… read more »
-
Jul 31, 2025
Those who know me are aware I like to mess around with all sorts of instruments: real ones, virtual ones, strings, brass, drums… if it makes noise and works in MIDI, I’ll give it a shot. But somehow, I always… read more »
-
Jul 30, 2025
In the beginner’s mind there are many possibilities, but in the expert’s there are few — Shunryu Suzuki A few days ago, I had the pleasure of attending a cozy gathering where Gianrico Carofiglio, celebrated Italian author and former magistrate,… read more »
-
Jul 27, 2025
Picture this: you’re part of a team trying to get stuff done. Maybe it’s deploy a feature, solving a thorny bug, or just making it to Friday without a full-blown existential crisis. And then (kaboom!) here come the meetings, the… read more »
-
Jul 20, 2025
So, Kubernetes 2.0 is on the horizon, and apparently they’re finally saying goodbye to YAML. Let me just take a moment to savor this delicious irony. After years of telling us that YAML was the elegant solution to container orchestration,… read more »
-
Jun 29, 2025
Among my many passions, one stands out for being as humbling as it is addictive: chess. Despite being a fairly mediocre player (my win/loss ratio is… let’s say balanced by optimism), I absolutely love spending my free time playing online… read more »
-
Jun 20, 2025
Today I decided to run a little experiment. I asked an AI to write a brutally honest, no-holds-barred critique of Kubernetes, something really spicy that would make the container orchestration crowd squirm in their ergonomic office chairs. “Make it controversial,”… read more »
-
Jun 15, 2025
A few days ago, a friend dropped what she probably thought was a simple compliment: “I’ve been listening to your music on Spotify: I really love your guitar pieces. But why don’t you ever play them live?” Her face when… read more »
-
Jun 13, 2025
A new phenomenon has emerged that’s capturing the attention of managers, HR departments, and workplace psychologists alike. It’s called “task masking,” and it represents a fascinating intersection of technology, psychology, and workplace rebellion that’s reshaping how we think about productivity.… read more »
-
May 23, 2025
Recently, a friend asked me about the differences between Gmail and iCloud email services, particularly from a security and privacy standpoint. I found myself unable to give a definitive answer on the spot, which prompted me to dive deeper into… read more »
-
May 3, 2025
In recent years, a term has infiltrated our collective workplace vocabulary, seemingly striking apprehension into the hearts of managers globally: “quiet quitting.” If you have been following workplace trends, you have likely encountered a barrage of articles, often painting this… read more »
-
Apr 29, 2025
Cyber Threat Intelligence (CTI) is critical for identifying, monitoring, and responding to malicious actors and infrastructures. Traditionally, CTI has relied on obvious indicators of compromise (IoCs) like IP addresses, domain names, and malware hashes. However, these indicators can quickly lose… read more »
-
Apr 24, 2025
Over the years, I’ve come to recognize and work on a series of leadership habits that, despite appearing beneficial at first glance, can significantly disrupt team dynamics and hinder overall performance. These habits often stem from a genuine desire to… read more »
-
Apr 20, 2025
“Why bring your own tools when the house is already full of them?” This is precisely the principle behind one of the most cunning techniques employed by cybercriminals: the use of LOLBins. What are LOLBins? LOLBins, an acronym for “Living… read more »