blog 71
- n8n Egress Controls for Security Automation
- Designing a Replayable Authorization Control Plane for Agentic Systems
- AI Security Scorecard for Engineering Teams
- Building a SOC Co-Pilot with Safe Retrieval Boundaries
- RAG Retention and Data Lifecycle Controls
- n8n Change Management and Workflow Provenance
- Eval-Driven Security Testing for LLM Apps
- Incident Response for AI Workflow Failures
- Secure MCP and Tool Server Patterns for Agentic Systems
- Detecting Token Abuse and API Key Theft in LLM Platforms
- PII Redaction in AI Pipelines Before Retrieval and Logging
- Red Teaming RAG Applications in a Home Lab
- Automating Phishing Triage with n8n and Guardrailed LLMs
- Model Supply Chain Security for Self-Hosted AI
- RAG Access Control with Attribute-Based Authorization
- Policy as Code for LLM Prompts and n8n Flows
- Canary Tokens for RAG Exfiltration Detection
- Building an AI Security Logging Baseline
- Secure Tool Calling for LLM Agents
- Human-in-the-Loop Approval Gates in n8n Security Workflows
- Vector Database Isolation for Multi-Tenant AI Systems
- Defending RAG Pipelines from Data Poisoning
- RAG Threat Modeling: Prompt Injection to Data Exfiltration
- Securing n8n Webhooks Against Replay and Abuse
- n8n Credential Hygiene for Security Automation
- Security Metrics That Help Engineering Teams
- Linux Auditd Essentials for Privilege Escalation Detection
- Secrets Management for Small Teams: AWS Secrets Manager + CI
- Email Authentication in Practice: SPF, DKIM, and DMARC
- Vulnerability Management Cadence for a Home Lab
- Supply Chain Security in CI: SBOMs, SLSA, and Sigstore
- Log Clustering and Triage with LMStudio, Python, and SQLite
- Ransomware Recovery Lab: Immutable Backups and Restore Drills
- Reverse Proxy WAF with Nginx and ModSecurity
- Linux Binary Hardening: RELRO, PIE, NX, and CET
- Kerberos Attack Lab: AS-REP Roasting and Detection
- Container Breakout Detection with eBPF and Tracee
- Threat Intel Enrichment with STIX/TAXII and Python
- Local LLM Log Summaries with LMStudio and Python
- Hardening SSH: Modern Ciphers, MFA, and Audit Trails
- Detecting Lateral Movement with SMB and WinRM Telemetry
- TLS 1.3 Handshake Analysis with OpenSSL and Wireshark
- Home SIEM Architecture: Wazuh + OpenSearch + Zeek
- Practical YARA Engineering for Malware Triage
- Windows Telemetry in Depth: Sysmon + WEF in a Lab
- Detecting DNS Tunneling with Zeek, Passive DNS, and Python
- Building a Zeek and Suricata Dual Sensor for a Home Lab
- Build a Command-Line LLM with Python
- Cross-Site Scripting (XSS): A Technical Deep Dive
- Understanding the MITRE ATT&CK Framework
- Building a Home Lab Firewall
- Social Engineering Awareness
- Introduction to Threat Hunting
- Automating Tasks with Bash
- Incident Response Essentials
- Basics of File System Forensics
- Cryptography Fundamentals
- Understanding TLS and SSL
- Hardening Windows Systems
- What Are Syscalls in Linux and How Can We Use Them?
- Python for Security Professionals
- Mastering Autorecon: A Comprehensive Guide
- How to run a successful cybersecurity tabletop exercise
- Understanding the Slowloris Attack
- Why Password Strength Matters
- Packet Sniffing with Wireshark
- OWASP Top 10 Overview
- Intro to Virtualization
- Essential Linux Commands for Security
- Network Scanning Basics
- Building Your Home Lab