Posts
All the articles I've posted.
Why CVSS Is Not the Metric You’re Looking For
Published:Relying solely on CVSS scores for vulnerability prioritization is risky and misleading—context, expert insight, and a robust patching process are essential to truly protect your business.
Homelab Setup Part 1: How I run my vServer
Published:Running and managing a virtual server (vServer) can be both fun and rewarding. Over time, I’ve streamlined my setup to reduce repetitive tasks and make deployments as seamless as possible. This is the first part of a series where I’ll share how I use Ansible, Docker, and a self-hosted Gitea instance to keep everything running smoothly while automating key tasks.
Rethinking Cyber Threat Intelligence: Strategic and Technical CTI as the New Standard
Published:As a Cyber Threat Intelligence (CTI) analyst, I’ve seen firsthand how organizations struggle to implement the classic four-tier CTI model: strategic, tactical, operational, and technical. While this framework is useful in theory, in practice, the distinction between operational and tactical intelligence is often blurred—if not entirely nonexistent. This reality has led some to propose simplifying the classification into just two categories: strategic and technical CTI.
Problems Are Just Problems
Published:Problems Are Just Problems, why Engineers Don’t Need the 'Opportunity' Spin
My first blog post
Published:My very first blog post, nothing special to see here.