Detection consulting • Security/data engineering collabs • Mentoring women in cyber • K8s security • Speaking opportunities
Mar 13 · 4 min read · For a small learning experiment, I wanted to build a Python tool that watches Linux logs in real time and analyzes them using a local LLM. The idea was simple: Capture logs → analyze them with AI → s
Join discussion
Oct 2, 2025 · 8 min read · Introduction Over the past few years, software supply-chain attacks have become one of the most disruptive and damaging trends in cybersecurity. Instead of directly targeting hardened corporate networks, adversaries now compromise the software compon...
Join discussionApr 11, 2025 · 3 min read · In an era where cyber threats are more evasive, automated, and persistent than ever, relying solely on traditional detection methods just doesn't cut it. As defenders, we’re expected to outsmart threat actors using an ever-growing sea of logs, alerts...
Join discussion