Visualizing cybersecurity concepts through diagrams, stories, and investigations.
Visual explanations of cybersecurity concepts like Kerberos, MITRE ATT&CK, Windows Event IDs, and telemetry flow.
Longer writeups that turn diagrams and analogies into full explanations.
Hands-on notes, SOC investigations, log analysis, detection ideas, and technical experiments.
Authentication tickets, trust, and access flow shown as a visual system.
A storytelling framework for understanding attacker behavior.
What actually happens when an alert fires and how the story gets built from logs.