The author discusses the importance of podcasts in their learning and growth, and shares a list of the podcasts they regularly listen to, along with a brief description of each.
The author provides a review of the Framework Laptop 16, detailing his experience with the product. He highlights the company's admirable goal of building user-serviceable laptops and his positive experience with the assembly proc...
The author discusses the changes in his setup since 2019, including building a home lab, traveling for work, and replacing his MacBook Pro with a new laptop. He also talks about his writing tools and backup system.
The text discusses the famous quote about premature optimization by Donald Knuth and argues that laziness has taken the place of premature optimization as the root of all evil in programming. It emphasizes the importance of writin...
The article discusses the dangers of metrics in cybersecurity, highlighting the potential for misinterpretation and manipulation of data. It emphasizes the importance of measuring and managing the right things in the right ways to...
The article is a reading list of resources on artificial intelligence, particularly large language models. It is organized into sections covering different aspects of AI, from high-level primers to theoretical questions and applic...
The text discusses the misconception of needing AI for network utilization improvement, using a story from a working group meeting as an example. It highlights the importance of understanding the actual problem before seeking AI o...
Zachary Szewczyk introduces his latest project, Colors, which helps to generate large sets of attractive and accessible color schemes. The project is a direct NodeJS-to-Python port of Matthew Strom's code from 2022 with a few mino...
The article provides recommendations for defensive cyber analysts on which SANS courses to take, based on the author's personal experience. The author recommends starting with FOR578: Cyber Threat Intelligence, then taking FOR572:...
The author discusses how he wanted a cool shell prompt and decided to let ChatGPT make it for him. He explains the schema for his new prompt and how it presents git information. He also provides examples of how the prompt looks in...
The text discusses the Baseline Fallacy in defensive cyber operations, highlighting the challenges of capturing a suitable baseline and identifying meaningful deviations from it. It emphasizes that detection is not a matter of jus...
The text discusses the challenges of data-driven decision-making in the military, focusing on collection, transport, and presentation of data. It highlights the importance of considering all three challenges together and the impac...
The author discusses how he uses Git to synchronize work between different devices and platforms, and how he has integrated Git into his workflow. He explains the benefits of using Git, such as portability, versioning, backup, and...
The author discusses using git-filter-repo to fix inconsistencies in his commit messages and email addresses. He also used the tool to remove sensitive files from his repositories.
The text is a post by Zac Szewczyk about tools and resources for cybersecurity analysts. It contains a version of a chapter from his book Handbook for Defensive Cyberspace Operations, focusing on threat intelligence and reference ...
The article discusses the waning popularity of professional certifications in the cybersecurity industry, particularly in the private sector. The author shares his experience of passing the Certified Information Systems Security P...
The article discusses the difference between individual and program SOC metrics, and the danger of introducing metrics into an organization not ready for them. It provides specific recommendations for applying SOC metrics to indiv...
The author discusses the importance of the collection process in the intelligence and information security fields, emphasizing that effective analysis relies on quality data collection. The text highlights the impact of biases at ...
The article discusses the need for incorporating metrics, specifically measures of effectiveness, into defensive cyberspace operations. The author highlights the discrepancy between measures of performance and measures of effectiv...