Threat-Informed Detection in Real Environments
How to model detections around attacker behavior and incident response decisions.
DraftingRead article
Long-form technical writing on security, infrastructure, and operational excellence. Structured for SEO and discoverability.
How to model detections around attacker behavior and incident response decisions.
Backups, restores, alerts, and change control for serious personal infrastructure.
Designing scripts, jobs, and runbooks that remain useful six months later.