Blog

Technical and strategic analysis articles on cybersafety, threat intelligence, Linux systems, networks, and open source infrastructures.

This blog brings together technical and strategic analysis articles focused on cybersecurity which I prefer to refer to as cybersafety, as well as threat intelligence, Linux systems, networking, and open source infrastructures.

The content published here emphasizes a structural, operational approach, independent of trends and hype, grounded in real-world situations, concrete architectures, and my own field experience.

Sections

Cyber

Articles covering cybersafety (cybersecurity), threat intelligence, SIEM, system hardening, and incident response, with a focus on analysis, structure, and operational realism.

  • Cyber – Fundamentals : Foundational articles exploring the core principles of security and safety in modern information systems.
  • Threat Intelligence : Articles focused on the analysis and structuring of Threat Intelligence, applied to information systems and exposed environments.

Everything That Is Not Explicitly Authorized Is Forbidden

January 29, 2026 ·6 min · cyber · fundamentals

Introduction: This statement is ubiquitous in discussions about information system security. It appears in training materials, documentation, and operational guidelines, particularly in the context of network filtering and firewall configuration. It expresses a legitimate intention: to reduce the exposure surface by strictly limiting what is accessible. Used as a methodological framework, it makes sense. But its actual scope is very often overestimated.

cybersafety open-source architecture defense

Threat Intelligence

January 12, 2026 ·3 min

Definition : Threat Intelligence is built on two fundamental and inseparable pillars: threat origin, and depth of penetration Together, these two axes transform raw technical events into actionable knowledge.

threat-intelligence logs http safety