Justin Johnson
Justin Johnson

Justin Johnson

Detection Engineering

343 stories

Justin Johnson

Justin Johnson

ThreatHunting

69 stories

Justin Johnson

Justin Johnson

MetricsnKPIs

5 stories

Justin Johnson

Justin Johnson

Adversary Emulation

40 stories

Justin Johnson

Justin Johnson

AI/LLMs

4 stories

In this blog post, the author discusses the role of AI in the content creation process, focusing on rewriting tools like Jasper AI’s article rewriter tool. They explain how traditional “rewrite” prompts can lead to uninspired and repetitious text, which is less than ideal for content marketers focusing on search engine optimization. They argue that input text should be more precise to elicit the best output from an AI writer, offering a list of 31 prompts to aid
Justin Johnson

Justin Johnson

Forensics

24 stories

Justin Johnson

Justin Johnson

MalwareAnalysis

20 stories

Justin Johnson

Justin Johnson

Red Team

80 stories

Justin Johnson

Justin Johnson

Cyberlab

30 stories

Justin Johnson

Justin Johnson

Mindmaps

1 story

Justin Johnson

Justin Johnson

HomeSecurity

3 stories

SSH Key-based Authentication diagram
Justin Johnson

Justin Johnson

Linux Admin

15 stories

Justin Johnson

Justin Johnson

ThreatIntel

60 stories

Traffic Light Protocol (TLP)
What is threat modeling
Justin Johnson

Justin Johnson

Osint

8 stories

Black and white pencil sketch of a Python snake wrapped around a computer displaying code, with subtle dark web elements and the Tor logo.
Justin Johnson

Justin Johnson

Incident Response

43 stories

Justin Johnson

Justin Johnson

Blue Team

55 stories

SSH Key-based Authentication diagram
Justin Johnson

Justin Johnson

SOC

11 stories

Justin Johnson

Justin Johnson

Tenable

No stories

Justin Johnson

Justin Johnson

AI Hacking

No stories

Justin Johnson

Justin Johnson

Scripting

13 stories