I decided that I was spending too much time writing instructions in random Google docs, text files, and GitHub repos. I wanted to have a single location that I could use as a way to publicly document all the things that I tinker with:

  • Kubernetes
  • Docker (who doesnt?)
  • Splunk
  • Raspberry Pi
  • Random tech integrations (this list could go on forever)

With all of that, I felt that it was time to put it all into a blog. As I travel through life building these random things, I intend to document them here and link to any files, repos, or websites that I have created myself or used along the way.

Enjoy!

DevSecOps: Bridging Security and Operations in Modern Development

Introduction to DevSecOps: Bridging the Gap Between Development, Security, and Operations The integration of security practices within the DevOps lifecycle, known as DevSecOps, is crucial for developing secure, reliable, and high-quality software products. DevSecOps bridges the gap between development, security, and operations teams, fostering a culture of collaboration and automation. This approach ensures that security is not an afterthought but an integral part of the software development lifecycle. Understanding the DevOps Lifecycle and Where Security Fits In The DevOps lifecycle encompasses several stages, including planning, coding, building, testing, releasing, deploying, monitoring, and feedback. Security should be integrated into each stage to ensure comprehensive protection. ...

July 15, 2025 · 4 min · Scott

Optimized Blog Post Title

Unfortunately, without the focus area or key research information, I can only provide a general template for the blog post. Please provide the necessary details to create a more tailored and detailed outline. However, here is a general template that you can modify to fit your needs: Introduction to [Focus Area] [Focus Area] is a critical concept in the field of [related field], with a rich history dating back to [time period]. In this blog post, we will delve into the definition, history, and importance of [Focus Area], providing a comprehensive understanding of its significance in the industry. ...

July 13, 2025 · 4 min · Scott

2. A Deep Dive into Google's Gemini CLI: Local AI Model Execution

A Deep Dive into Google’s Gemini CLI: Local AI Model Execution Introduction Google’s Gemini CLI is a powerful, open-source AI agent designed to bring Google’s Gemini models directly into the terminal. This tool allows developers to interact with advanced AI models through natural language prompts, enabling a wide range of tasks beyond traditional coding. In this article, we’ll delve into the features, capabilities, and applications of Gemini CLI, exploring its potential to revolutionize developer productivity and democratize AI. ...

July 1, 2025 · 3 min · Scott

*2. Deep Dive into Passkey Logins: Security Analysis and Implementation

Deep Dive into Passkey Logins: Security Analysis and Implementation Introduction Password-based authentication is a cornerstone in the sphere of authentication and authorization, despite its security challenges. The human factor is often the weakest link in security chains, and users frequently compromise security mechanisms. A shift in focus towards efficient user-centric mechanisms, protocols, and frameworks is necessary to balance security and usability. Passkeys have emerged as a key technology to resolve this tension, offering a secure, seamless, and modern authentication experience. ...

June 24, 2025 · 3 min · Scott
AI and cybersecurity concept art

AI-Powered Sentinels: A Guide to Vulnerability Scanning with Lambda's Inference API

The digital landscape is in a perpetual state of evolution, and with it, the sophistication of cyber threats. Traditional vulnerability scanning methods, while foundational, are increasingly strained by the sheer volume and complexity of modern software. Artificial Intelligence (AI) is emerging as a powerful ally, offering transformative capabilities in how we identify, analyze, and mitigate security weaknesses. This article delves into the burgeoning field of AI-driven vulnerability scanning, providing a comprehensive overview and, crucially, a hands-on guide to leveraging Lambda’s Inference API for a practical vulnerability analysis task. ...

June 10, 2025 · 8 min · Shellnet Security