All Posts

Pinned
Quick read

Passing the CISSP at 100 Questions

I passed the CISSP on April 6, 2026, at 100 questions. Here is a breakdown of my study timeline, resources, question practice, and exam-day experience.

Quick read

Recent Cisco Switch & Firewall Vulnerabilities

Critical IOS XE vulnerabilities are being actively exploited, patch immediately. Click to read more

Quick read

Prompt Injection: The Silent Bug That Can Break LLM Models

Chatbots and LLMs can follow instructions too well. Here's how malicious prompts bypass filters and what you can do

Quick read

iHackCTF 2025: How I Solved Some Challenges

Writeup : my approach.

Quick read

Why Theoretical Security Fails in Production

Why theoretical security fails in production, and how 'good enough' controls actually survive enterprise environments.

Quick read

Security Architecture: Principles for Designing Secure Systems and Networks

An overview of core security architecture principles, including defense in depth, zero trust, IAM, network segmentation, and compliance for designing secure systems.

Quick read

Why Zero Trust is Your Network's New Best Friend

A guide to Zero Trust architecture, explaining its core principles, why it's essential for modern security, and how to implement it with key technologies like IAM, MFA, and ZTNA.

Quick read

Cloud Security Overhaul: Is Zscaler the Right Move for Your IT Company?

An analysis of Zscaler's cloud security platform (ZIA, ZPA, ZDX) for large IT companies, covering its Zero Trust model, deployment, cost, and real-world use cases.

Quick read

Mastering Firewall Compliance: Beyond the Checkbox

A comprehensive guide to firewall compliance, covering key standards like PCI DSS, ISO 27001, and HIPAA, and best practices for policy, change management, and auditing.

Quick read

AI in IT Infrastructure and Cybersecurity: What's Real, What's Hype, and What Tools We Can Actually Use

A practical look at AI's role in IT and cybersecurity, covering AIOps, threat detection, and a review of real-world tools like Microsoft Copilot, Darktrace, and more.

Quick read

Skybox Ghosted You? : A Real-World Comparison of Possible Alternatives

A practical comparison of the top Network Security Policy Management (NSPM) tools: Algosec, Tufin, and FireMon, focusing on their core strengths, use cases, and key differences.

Quick read

Firewalls: Still Your Network's Bouncer in 2025 (And How Not to Mess It Up)

A deep dive into firewall fundamentals, covering types (NGFW, Cloud), deployment strategies (Perimeter, DMZ), and best practices for hardening, logging, and rule management.