HomeLab with Ubuntu, KVM, Cockpit, Kubernetes, and cache-enabled Software RAID

Overview I think it's important to keep in touch with technology and maintain a hands-on perspective so that what you talk about is not just theoretical but practical and based on fact. As hardware becomes more and more abstracted and lab environments end up being in the cloud or within some virtual environment where you [...]

Focus on Gen AI: Prompt Engineering

. Prompt Engineering is an essential skill for anyone working with Generative AI systems. Whether you're a developer, researcher, or just someone with a keen interest in AI, learning to communicate effectively with these systems can significantly improve the outcomes you're aiming for. This is generally the first rite of passage when interacting with LLMs. [...]

Focus on Gen AI: The Fundamentals

The pace at which generative AI is advancing and changing is a site to behold. I have immersed myself in it as much as possible. Multiple daily newsletters, video updates and how-to articles. Reviewing research papers, watching trending AI GitHub repos, listening to thought leaders, and trying to understand where we are, and where we [...]

Key Findings and Recommended Risk Mitigations from The Verizon 2023 Data Breach Investigations Report

What is the Verizon DBIR? The Verizon Data Breach Investigations Report (DBIR) is an annual report that analyzes and presents data on cybersecurity incidents and data breaches. It is widely respected and closely followed in the cybersecurity industry due to its comprehensive and data-driven approach. The DBIR leverages data contributed by dozens of global organizations [...]

Unlocking Your Cybersecurity Budget: A Detailed Guide to Leveraging CVSS, EPSS, and CISA KEV

[Post 30 - 30 in 30] Effective cybersecurity management involves leveraging a variety of tools and resources. Three such tools, CVSS (Common Vulnerability Scoring System), EPSS (Exploit Prediction Scoring System), and CISA KEV (Known Exploited Vulnerabilities), are critical for identifying, assessing, and mitigating potential threats. Harnessing CVSS, EPSS, and CISA KEV The first tool, CVSS, [...]

10 Must-Read Cybersecurity Books: Expand Your Expertise and Stay Ahead of the Game

[Post 27 - 30 in 30] As a cybersecurity professional, you understand the critical importance of continuous learning and staying ahead of the ever-evolving threat landscape. To further enhance your expertise and insights, we have curated a selection of 10 influential cybersecurity books written in the past decade. These books, authored by renowned experts, hackers, [...]