enigmatracer.comStep-by-Step: Using Agentic AI to Form a Cybersecurity Threat Intelligence TeamIntroduction Welcome back, amigos! I’ve been wanting to create more projects around AI Agents to show what’s possible when we move beyond simple chatbots. This is the first in a series of "Agentic Blueprints" that you can use as a starting point. Thi...Dec 23, 2025·9 min read
enigmatracer.comThe Skills Bridge: Translating Operational Experience into Strategic Cyber ValueIntroduction It was a privilege to join Omar Sangurima and Alyson Laderman recently on The Cyber Mettle Podcast to talk about a topic that is deeply personal to me: the transition from high-stakes operational roles, like military service, into the ci...Nov 23, 2025·5 min read
enigmatracer.comAV vs. EDR: Exploring the Future of Antivirus SoftwareIntroduction Imagine your colleague, José, clicks a link in a well-crafted phishing email. A simple file downloads, and a few hours later, your network monitor flags a torrent of suspicious, encrypted outbound traffic. If all you have running on José...Nov 4, 2025·6 min read
enigmatracer.comRAG in AI: What Beginners Should Know About Technology and Security ThreatsDisclaimer: The views and opinions expressed in this blog post are my own and do not represent the official stance of any organization I am affiliated with. Introduction Welcome back to the blog! It’s been a busy few weeks, but a recent conversation ...Aug 21, 2025·8 min read
enigmatracer.comGCP Security Lab: Intro to Web App Penetration Testing with DVWADisclaimers & Personal Context My Views: This project and the views expressed in this blog post are my own and do not necessarily reflect the official stance or opinions of Google Cloud or any other entity. Learning Journey: This lab is another opp...Aug 15, 2025·19 min read