May 04, 2025

In today’s fast-paced digital world, manually tracking and responding to cybersecurity threats is no longer enough. Automating threat intelligence helps organizations stay one step ahead by streamlining detection, analysis, and response.

Post cover
February 26, 2025

This series of Patreon posts dives deep into the automation of Palo Alto Networks devices and software, offering you a comprehensive guide to streamlining and optimizing your security operations. Throughout the series, we explore how to automate various components, including firewalls, Cortex XDR, and Cortex XSOAR, to enhance your network security and incident response capabilities.

Post cover
February 25, 2025

In this series, we’ll explore the core principles of network automation, essential tools, and practical techniques to streamline your network operations. Whether you’re new to the field or looking to sharpen your skills, our posts will provide the foundational knowledge you need to succeed.

Post cover
February 22, 2025

Embark on a journey to elevate your network engineering skills by choosing the right path in network automation. Whether you’re looking to automate firewall management with Palo Alto Networks, streamline configurations with Ansible, or delve into advanced network emulation with UNetLab, this learning path has you covered.

Post cover
February 18, 2025

In today’s interconnected world, securing and understanding Operational Technology (OT) and Industrial Control Systems (ICS) is more important than ever. This series of posts explores hands-on lab setups, security best practices, and key learning resources to help you build, test, and protect critical infrastructure.

Post cover
February 16, 2025

Welcome to our series on Cisco Automation Solutions! In this series, we’ll explore how Cisco’s powerful tools and technologies, like Catalys Welcome to our series on Cisco Automation Solutions! In this series, we’ll explore how Cisco’s powerful tools and technologies, like Catalyst Center, APIs, and SDKs, can help automate network management, optimize configurations, and improve device monitoring.

Post cover
December 02, 2024

A lot has already been said about Vulnerability Management (VM), and I’ve personally touched on this topic several times before. Yet, the reality is that managing vulnerabilities remains a significant challenge for most organizations.

Post cover
October 12, 2024

There is much discussion around Zero Trust Architecture (ZTA), but it seems the concept of Assume Breach Design has yet to be formalized. Or, at least, a Google search does not yield results.

Post cover
September 05, 2024

It’s time to revisit the ICS/OT world, as it has unique characteristics that influence its processes and tools. First, I would categorize this broad field into the following groups: Systems localized within a confined area (e.

Post cover
July 31, 2024

In 2013, I presented a critical case that could cause a complete isolation of a datacenter. Eleven years later, the situation remains the same. Let’s reflect on a few points.

Post cover