Joe Lopes
Improving SecOps Beyond Tuning Analytics
The Cuckoo's Egg
A 1980s Infosec thriller with groundbreaking investigations.
The Threat Detection Fundamental Dilemma
Exploring the dilemma in threat detection: Precision vs. Recall for analytics.
A Little Hardening with Burp
Guide to MITRE ATT&CK with history and context for better usage.
MITRE ATT&CK 101: Bridging the Gap
Guide to MITRE ATT&CK with history and context for better usage.
Testing The Logfile Navigator
Exploring log analysis with lnav tool: challenges, insights, and tips.
Getting Real About MITRE ATT&CK
Understanding MITRE ATT&CK and using it in your favor.
Insights into Effective SIEM Deployment
Strategies and tips for successful SIEM deployment.
Mastering your Performance
Tools, rituals, and reflections for professional growth in Infosec.
Understanding Severity and Priority
Uncover optimal Detection Rule settings for consistent, efficient alerts.
Productivity Unleashed
Seamless productivity with tools and a process for better organization.
Intelligence-Driven Incident Response
Discover how integrating CTI enhances Threat Detection and CSIRT.
Chronicle SIEM: Insights and Challenges Explored
Features and challenges in a review centered around Threat Detection.
Portfolio Tracker: Mastering your Finances
Enhance your portfolio management with this free and powerful spreadsheet.
Handling Floating Point Precision in Spreadsheets
Effective methods to handle floating point precision in spreadsheets.
Effective Detection Rules for Net and Port Scans
Effective network and port scan detection.
Hardening Email with DKIM, SPF, DMARC
Learn how to protect your mailboxes from cyber threats.
Using GPT-3.5 for SEO Advice
Using OpenAI's GPT-3 to generate SEO-friendly post metadata.
Export and Decode GAuth 2FA Accounts
How to export and decode GAuth 2FA.
Using AWS Secrets Manager in Your Scripts
Learn to authenticate in tools seamlessly.
Getting Started with CloudFlare for Web Protection
Use CloudFlare's free plan on personal sites for better security.
Updating Signed Documents with GPG
Update GPG signed documents, from key import to patching files in batch.
Getting Cryptocurrency Prices in Google Sheets
Get minor cryptocurrency prices in Google Sheets using 3rd party service.
Automating Incident Response
Tackling log centralization, SIEM operationalization, and IR automation.
The Importance of Logging Strategy
Streamlined planning and retention practices for better logging.
Friction Between Red Teams and Incident Response
Avoidable friction between cybersecurity teams during Red Team exercises.
My Minimalistic Approach to Mac System Setup
Learn how to setup your Mac system with fewer apps and keep it simple.
Query Security Services for IP Reputation
Query three security services in one shell script to check IP reputation.
Changing the Zola Theme
Valuable tips on changing your Zola blog theme without breaking the site.
Creating a Hardened Testing Environment
Install and harden Arch Linux to create a safer OS for network tests.
Set Static IP Address in Arch Linux
Learn how to set a static IP address in Arch Linux without DHCP support.
Recovering Arch Linux from a PAM Issue
How to recover Arch with a misconfigured PAM configuration.
Secure and Easy Password and MFA Management
Manage your passwords and MFA tools to maximize security and usability.
Calculating and Decomposing Syslog Priority
Calculate and decompose Syslog message priority.
Real-time Log Forwarding with Python and Syslog
Create a smart log forwarding script using Python and Syslog.
AWS Certified Security - Specialty Review
The materials and strategy I used to get this certification.
Logging Python Messages to Syslog in macOS
Send log messages from Python to Syslog in macOS.
My Journey to CISSP Certification
Mmy experience getting the CISSP certification.
Installing Nerd Fonts on Arch Linux
Learn how to install and use Nerd Fonts.
Arch Linux Workstation Setup
Install graphical environment and apps, setup configs in your workstation.
Linux Hardening with CIS Controls
Applying CIS controls for improving the security of an Arch Linux.
Arch Linux Hardened Installation Guide
Step-by-step guide to perform a hardened Arch Linux installation.
Blogging and the Freedom of the Web
Blogging remains a valuable platform for tech content.
Automating Network Management with NetBox Scanner
Streamlining network management with IPAM and a network scanner.
Verme Cervejeiro
[pt_BR] A broad and funny chronic about being a homebrewer in Brazil.
Trabalhando com Submódulos no Git
Adicione, atualize e remova submódulos no Git, comandos úteis e referência.
Criando um Tema para o Zola
Aprenda a criar um tema para Zola e contribua com a comunidade.
Certificação CompTIA Security+
Relato de como se preparar para a certificação S+ e dicas para estudos.
Certificações em Seleção de Pessoal
Descubra a importância das certificações na seleção de pessoal em TI.
Aprendendo a Criar Sites Estáticos com Zola
Zola comoopção para criar e manter sites seguros e de alta performance.