Research & Publications

Strategic analysis, technical publications and knowledge sharing.

Continuous strategic watch and technical exploration around cybersecurity architecture, threat intelligence, AI applied to security operations and the evolution of detection platforms.

AI & Cybersecurity Strategic Watch

Explores the intersection between artificial intelligence and cybersecurity: how AI supports detection, investigation and operational efficiency while introducing new governance and risk challenges.

  • AI‑assisted detection
  • Security automation
  • Operational decision support
  • Strategic outlook

Endpoint Detection & Response

Analysis of EDR/XDR platforms, detection capabilities and how endpoint telemetry integrates into modern SOC architectures.

  • EDR and XDR positioning
  • Detection and remediation
  • SOC integration
  • Operational visibility

Cyber Threat Intelligence

Threat intelligence as a strategic capability to anticipate threats, prioritize investigations and strengthen detection use cases.

  • Operational CTI
  • Threat hunting enrichment
  • Security decision support
  • Detection improvement

Incident Response

Methodologies and operational frameworks to organize response teams, playbooks and coordinated actions during cybersecurity incidents.

  • Preparation & response
  • Operational playbooks
  • SOC coordination
  • Continuous improvement

IBM Security Community Contributions

Public technical articles on IBM platforms, automation, network hierarchy design and operational security architecture.

  • QRadar automation
  • PulseQueryViewer
  • Network hierarchy management
  • Security architecture insights

PulseQueryViewer article
Network hierarchy article

GitHub Projects

Public repositories and experimentation lab around cybersecurity tooling, automation, AI‑assisted workflows and security knowledge engineering.

  • Security tooling
  • Automation scripts
  • AI / RAG experimentation
  • Operational cybersecurity tooling

View GitHub

Approach

Research connected to execution.

This research work is not about accumulating content but about connecting strategic watch, architecture, operations and delivery. The objective is to translate technological evolution into practical improvements in security posture and operational efficiency.