Feeling overwhelmed by AI? Learn the Centaur Mindset. Read More

Welcome. My work explores a single, critical question: How do we master the tools of a complex digital world?

Whether it’s deploying a Kubernetes cluster, automating a workflow, or—most recently—partnering with artificial intelligence, my goal is the same: to move beyond simply using technology and toward directing it with strategy, wisdom, and insight.

I’ve codified my framework for this new era of work in my book, The Centaur’s Edge: A Practical Guide to Thriving in the Age of AI. It provides the mindset and practical exercises needed to turn AI from a mysterious force into a powerful partner.

This blog is my workshop for that ongoing journey. I’m glad you’ve joined me.

Network port scanning visualization with Python code

Building a Custom Security Tool: Python Port Scanner from Scratch

Note: This guide is based on technical research from network protocol RFCs, Python socket programming documentation, and analysis of open-source scanning tools like nmap. The techniques described are for educational purposes and authorized security testing only. Unauthorized port scanning may violate computer fraud laws and terms of service. Code examples have been verified for functionality on Python 3.9+. Readers must obtain written authorization before scanning networks they do not own or have explicit permission to test. ...

December 27, 2025 · 20 min · Scott
Python and Bash scripts executing security automation workflows

Scripting for Security Automation: Python and Bash for SOC Operations

Note: This guide is based on technical research from security automation best practices, Python security library documentation, and analysis of production SOC automation workflows. Code examples use current stable versions of libraries and have been verified for functionality. The scripts provided are educational templates—readers should adapt error handling, logging, and security controls to their specific production requirements before deployment. Security teams face repetitive tasks that consume analyst time: log collection, IOC enrichment, vulnerability scanning, report generation, and routine investigations. According to Gartner’s 2024 Market Guide for Security Orchestration, Automation, and Response, organizations implementing security automation reduce mean time to respond (MTTR) by 60-80% and free analysts to focus on complex threats requiring human judgment. ...

December 20, 2025 · 17 min · Scott
Linux network namespaces and virtual network topology

Advanced Linux Networking Techniques: Namespaces, Routing, and Traffic Control

Note: This guide is based on technical research from Linux kernel documentation, networking RFCs, Red Hat and Ubuntu networking guides, and analysis of production networking implementations. The techniques described are technically sound and based on documented Linux networking capabilities. Code examples have been verified against current Linux kernel versions (5.15+). Readers should test configurations in non-production environments before deploying to production systems. Linux networking capabilities extend far beyond basic interface configuration. Modern Linux systems provide powerful network isolation, advanced routing, traffic shaping, and observability tools that form the foundation of container networking, software-defined networking (SDN), and high-performance network infrastructure. ...

December 13, 2025 · 16 min · Scott
Balance of AI ethics and security represented by scales of justice

Ethical Considerations in AI Security: Bias, Privacy, and Responsible Use

Note: This guide is based on research from AI ethics frameworks, academic publications on algorithmic fairness, NIST AI guidance, EU AI Act documentation, and industry best practices. The analysis presented draws from documented case studies and peer-reviewed research on AI ethics in security contexts. Readers should consult legal and compliance teams when implementing AI security systems to ensure alignment with applicable regulations and organizational values. AI-powered security tools promise faster threat detection, automated response, and reduced analyst workload. But these benefits come with ethical responsibilities that security teams must address proactively. Unlike traditional rule-based systems, AI models can exhibit bias, make opaque decisions, and create privacy risks that traditional security tools don’t. ...

December 6, 2025 · 18 min · Scott
AI analyzing security log streams

Using AI to Analyze Log Files for Security Threats

Note: This guide is based on technical research from security logging best practices, machine learning research papers, and analysis of open-source log analysis tools. The techniques described are technically sound and based on documented implementations in production security environments. Code examples use established Python libraries with verified package versions. Readers should adapt these approaches to their specific log formats and security requirements. Security teams drown in log data. A medium-sized enterprise generates terabytes of logs daily from firewalls, IDS/IPS, endpoints, applications, and cloud services. Traditional log analysis—grep, awk, and manual review—doesn’t scale to this volume. ...

November 29, 2025 · 18 min · Scott