Topic Clusters
This page organizes our content into thematic clusters to improve navigation and SEO performance.
Wazuh Security Platform
Core Wazuh Integration Series
- Integrating Wazuh with Ollama: Part 1 - AI-powered security monitoring
- Integrating Wazuh with Ollama: Part 2 - Advanced configuration
- Integrating Wazuh with Ollama: Part 3 - Automation workflows
- Integrating Wazuh with Ollama: Part 4 - Production deployment
Wazuh LLM Models
- Introducing Wazuh LLM: Fine-Tuned Llama 3.1 for Security Event Analysis - Specialized LLM for Wazuh events
- Two LLM Security Assistants for Wazuh and AWS Analysis - Fine-tuned models for security analysis
Wazuh Documentation & RAG
- Applying RAG for Wazuh Documentation: Part 1 - RAG implementation
- Applying RAG for Wazuh Documentation: Part 2 - Advanced techniques
Wazuh Integrations
- How to Set Up a Custom Integration between Wazuh and MARK - MARK integration guide
- Boosting Container Image Security Using Wazuh and Trivy - Container security
Wazuh Community
- Joining the Wazuh Ambassador Program - Community involvement and contributions
Enterprise Compliance & Security
AWS EKS Security & Compliance
- Amazon EKS SOC 2 Type II Compliance Checklist Part 1 - Compliance fundamentals
- Amazon EKS SOC 2 Type II Compliance Checklist Part 2 - Advanced controls
Container & Kubernetes Security
- Boosting Container Image Security Using Wazuh and Trivy - Vulnerability scanning
- Amazon EKS SOC 2 Type II Compliance Checklist Part 1 - EKS security
Security Research & Infrastructure
Research Infrastructure
- Honeypot cluster for security research - Research environment setup
- Building ML-Powered Threat Intelligence with Honeypot Datasets - ML threat detection
Advanced Security Tools
- Mitigation Anomaly Revelation Keeper (MARK) - AI-powered threat analysis
- How to Set Up a Custom Integration between Wazuh and MARK - Integration guide
Machine Learning & AI Security
ML-Powered Security Analytics
- Building ML-Powered Threat Intelligence with Honeypot Datasets - ML threat detection with Hugging Face
- Integrating Wazuh with Ollama: Part 1 - AI-enhanced SIEM
- Introducing Wazuh LLM: Fine-Tuned Llama 3.1 for Security Event Analysis - Specialized security LLM
AI-Driven Threat Detection
- Applying RAG for Wazuh Documentation: Part 1 - RAG for security documentation
- Applying RAG for Wazuh Documentation: Part 2 - Advanced RAG techniques
Specialized Security LLMs
- Two LLM Security Assistants for Wazuh and AWS Analysis - Fine-tuned Llama models for security
- Introducing Wazuh LLM: Fine-Tuned Llama 3.1 for Security Event Analysis - Wazuh-specific LLM
Tech Reflections & Satire
The LLM Apocalypse Trilogy
A satirical series exploring AI dependency through post-apocalyptic storytelling:
- Part 1: The Day the LLM Stood Still - Diary from a world without AI
- Part 2: The Catcher in the Prompt - Day 60 post-collapse
- Part 3: Only 1984 Tokens Remain - Dystopian trilogy finale
Related Content Recommendations
If you’re interested in Wazuh:
Start with the Ollama integration series, then explore the specialized Wazuh LLM, RAG documentation and container security.
If you’re working with AWS/Kubernetes:
Begin with EKS compliance checklist and explore container security practices.
If you’re into security research:
Check out the honeypot cluster setup and learn about MARK platform.
If you’re interested in AI/ML for security:
Start with specialized security LLMs and explore the Wazuh LLM model.
If you enjoy tech satire:
Read The LLM Apocalypse Trilogy - a three-part satirical series on AI dependency.