Feeling overwhelmed by AI? Learn the Centaur Mindset. Read More
AI-powered security automation workflow

AI-Powered Security Automation: Automating Incident Response Workflows

Note: This guide is based on technical research from authoritative security sources, NIST publications, MITRE ATT&CK documentation, and open-source security automation frameworks. The techniques described are technically sound and based on documented production implementations. Readers should adapt these approaches to their specific security requirements and compliance needs. Security Operations Centers (SOCs) face an overwhelming volume of security alerts. According to the Ponemon Institute’s 2023 Cost of a Data Breach Report, organizations receive an average of 4,484 security alerts per day, with SOC analysts able to investigate only 52% of them. AI-powered automation offers a path to handle this alert fatigue while reducing mean time to respond (MTTR). ...

November 22, 2025 · 16 min · Scott
WordPress to Hugo migration visualization

From WordPress to Hugo: Lessons from a Static Site Migration

I’ve been running My Battles With Technology as a WordPress site since December 2020, after starting on Kubernetes with a custom nginx+PHP+git-sync deployment. While WordPress served me well for content management, I kept hitting the same pain points: plugin updates breaking things, security concerns with PHP, and the overhead of managing a database for what’s fundamentally a read-heavy content site. After reading about static site generators and seeing Hugo mentioned repeatedly in infrastructure circles, I decided to migrate. Here’s what that journey actually looked like. ...

November 8, 2025 · 11 min · Scott
A secure vault integrated into a Kubernetes container cluster, representing secrets management

Kubernetes Secrets Management: Beyond the Basics

A Kubernetes Secret is not actually secret. That’s a hard sentence to sit with, especially if you’ve been dutifully creating Secret objects and patting yourself on the back for not hardcoding credentials in your ConfigMap. The problem runs deeper than most teams realize, and it doesn’t get fixed by following the basic Kubernetes documentation. This post is about what actually works, at different scales, with honest tradeoffs for each approach. ...

March 20, 2026 · 12 min · Scott Algatt
A technical professional at a workstation, half-illuminated by natural light and half by the glow of AI-generated data visualizations

The Evolving Role of the Technical Professional in an AI World

This is the final post in “The Centaur’s Toolkit” series, where we’ve explored practical strategies for human-AI collaboration in technical work. This installment steps back from specific tools and practices to ask the bigger question: what does all of this mean for your career? Everyone’s asking if AI will take their job. They’re asking the wrong question. I’ve been watching this conversation play out across tech communities for the past couple of years, and the framing bothers me. “Will AI replace programmers?” produces a yes/no answer that nobody actually believes, regardless of which direction they lean. It generates heat without light. ...

March 13, 2026 · 13 min · Scott Algatt
A grid of glowing containers with padlocks and a shield motif in a dark datacenter atmosphere

Container Security Fundamentals: What Actually Matters

It started with a misconfigured CI runner. A developer had a Jenkins pipeline building Docker images. The container ran as root. A dependency had a known RCE vulnerability. When the exploit landed, the attacker had root inside the container, and because that process was root, they also had root on the host. They pivoted to the secrets store, grabbed credentials, and spent three weeks inside the network before anyone noticed. ...

March 6, 2026 · 12 min · Scott Algatt