I decided that I was spending too much time writing instructions in random Google docs, text files, and GitHub repos. I wanted to have a single location that I could use as a way to publicly document all the things that I tinker with:

  • Kubernetes
  • Docker (who doesnt?)
  • Splunk
  • Raspberry Pi
  • Random tech integrations (this list could go on forever)

With all of that, I felt that it was time to put it all into a blog. As I travel through life building these random things, I intend to document them here and link to any files, repos, or websites that I have created myself or used along the way.

Enjoy!

Securing the Internet of Things: A Comprehensive Guide to Implementing Cybersecurity Measures for IoT Devices

Securing the Internet of Things: A Comprehensive Guide to Implementing Cybersecurity Measures for IoT Devices ==================================================================================== Introduction The Internet of Things (IoT) has transformed the way we live and work, connecting billions of devices to improve convenience, efficiency, and innovation. However, this interconnected world brings significant cybersecurity challenges. As IoT technology becomes more widespread, cybersecurity threats are becoming more sophisticated. In this article, we will discuss the essential steps for implementing robust IoT cybersecurity measures to safeguard devices and networks against potential threats. ...

January 15, 2025 · 5 min · Scott

Enhancing Secure Boot with Unified Kernel Images (UKIs)

Enhancing Secure Boot with Unified Kernel Images (UKIs) ===================================================== Introduction Secure boot processes are crucial in modern computing to prevent unauthorized firmware, operating systems, or UEFI drivers from running on a computer. One of the recent developments in this area is the use of Unified Kernel Images (UKIs) to enhance boot security. In this article, we will explore the concept of UKIs and provide a step-by-step guide on how to implement them to improve secure boot processes. ...

December 31, 2024 · 5 min · Scott

Upgrading to SHA-256: A Comprehensive Guide to Cryptographic Hash Functions

Table of Contents Introduction Prerequisites Understanding SHA-1 and its Limitations Introduction to SHA-256 Implementing SHA-256 in Practice Migrating from SHA-1 to SHA-256 Conclusion Introduction Cryptographic hash functions play a vital role in ensuring data integrity and security in various applications. In this guide, we’ll explore the evolution of cryptographic hash functions, discuss the limitations of SHA-1, and provide a comprehensive guide to implementing and using SHA-256. Prerequisites To follow this guide, you should have a basic understanding of cryptography and hash functions. Familiarity with programming languages such as Python, C++, or Java is also recommended. ...

December 31, 2024 · 3 min · Scott

Leveraging AI for Network Flow Analysis: A SOC Analyst's Guide

As a SOC analyst, one of the most critical tasks is analyzing network flow data to identify potential security threats. In this post, we’ll explore how to combine cloud-based data storage, SQL querying, and AI-powered analysis to streamline this process. Collecting Flow Data in Amazon Athena Amazon Athena provides a serverless query service that makes it easy to analyze data directly in Amazon S3 using standard SQL. Here’s how we set up our flow data collection: ...

December 20, 2024 · 5 min · Scott

Hugo Migration Complete: A Look at the Performance Gains

I was able to complete my testing earlier than expected and was able to do the cutover early! This means that my migration from WordPress to Hugo is complete! What’s really cool here is the overall performance improvement to the website. Performance Improvements I have a few site monitors running against the website to tell me when it goes offline or is having issues: UptimeRobot DigitalOcean Monitoring After cutting over to Hugo this morning, I noticed a rather large improvement to my response times for the website. The below graph shows my UptimeRobot monitor: ...

September 26, 2024 · 3 min · Scott