<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Anthony G. Tellez - Technical Blog</title>
    <description>Technology Executive and AI Security Strategist sharing insights on machine learning, cybersecurity, data science, and enterprise security solutions.</description>
    <link>https://anthonygtellez.com</link>
    <language>en</language>
    <lastBuildDate>Thu, 26 Mar 2026 22:40:24 GMT</lastBuildDate>
    <atom:link href="https://anthonygtellez.com/feed.xml" rel="self" type="application/rss+xml"/>
    <managingEditor>anthonygtellez@gmail.com (Anthony G. Tellez)</managingEditor>
    <webMaster>anthonygtellez@gmail.com (Anthony G. Tellez)</webMaster>
    <image>
      <url>https://anthonygtellez.com/images/headshot.jpg</url>
      <title>Anthony G. Tellez</title>
      <link>https://anthonygtellez.com</link>
    </image>
    
    <item>
      <title><![CDATA[How a GitHub Archive of BASHLITE Ended Up in Academic Research]]></title>
      <description><![CDATA[In 2015, I uploaded the BASHLITE botnet source code to GitHub for research purposes while working at Splunk. A decade later, that archive has been cited in peer-reviewed IoT security research and used as a primary source for malware analysis and detection engineering.]]></description>
      <link>https://anthonygtellez.com/blog/2026-03-26-bashlite-research-citations</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2026-03-26-bashlite-research-citations</guid>
      <pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Security Research]]></category>
      <category><![CDATA[BASHLITE]]></category>
      <category><![CDATA[Gafgyt]]></category>
      <category><![CDATA[IoT]]></category>
      <category><![CDATA[Botnet]]></category>
      <category><![CDATA[Malware]]></category>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Academic Citations]]></category>
      <category><![CDATA[Detection Engineering]]></category>
      <category><![CDATA[2026]]></category>
    </item>
    <item>
      <title><![CDATA[RAG for Security: Evolution and Modern Implementation]]></title>
      <description><![CDATA[How RAG for security has evolved from research to practice. Building on SuriCon 2024 work, this post explores modern approaches with Claude, a 2,400-document knowledge base spanning MITRE ATT&CK, CISA KEV, and Suricata, and an interactive browser-based demo.]]></description>
      <link>https://anthonygtellez.com/blog/2026-03-01-rag-evolution-modern-implementation</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2026-03-01-rag-evolution-modern-implementation</guid>
      <pubDate>Sun, 01 Mar 2026 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[RAG]]></category>
      <category><![CDATA[Claude]]></category>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[Security Analytics]]></category>
      <category><![CDATA[Vector Search]]></category>
      <category><![CDATA[Anthropic]]></category>
      <category><![CDATA[LLM]]></category>
      <category><![CDATA[Suricata]]></category>
      <category><![CDATA[MITRE ATT&CK]]></category>
      <category><![CDATA[Embeddings]]></category>
      <category><![CDATA[CISA]]></category>
    </item>
    <item>
      <title><![CDATA[Rewriting a Python Moderation Service in Go: From 3GB to 50MB]]></title>
      <description><![CDATA[Why I rewrote a real-time moderation and TTS service from Python to Go, what the memory and startup time differences actually looked like, and how the concurrent pipeline architecture changed what the service could do.]]></description>
      <link>https://anthonygtellez.com/blog/2026-01-15-rewriting-python-service-go-performance</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2026-01-15-rewriting-python-service-go-performance</guid>
      <pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Go]]></category>
      <category><![CDATA[Python]]></category>
      <category><![CDATA[Performance]]></category>
      <category><![CDATA[Refactoring]]></category>
      <category><![CDATA[Backend]]></category>
      <category><![CDATA[API Design]]></category>
      <category><![CDATA[Systems Programming]]></category>
      <category><![CDATA[Concurrency]]></category>
      <category><![CDATA[TTS]]></category>
      <category><![CDATA[ElevenLabs]]></category>
      <category><![CDATA[Real-time]]></category>
      <category><![CDATA[Moderation]]></category>
      <category><![CDATA[Architecture]]></category>
    </item>
    <item>
      <title><![CDATA[Building a Public API Without Exposing Your Private Application]]></title>
      <description><![CDATA[How to serve curated public data from a private analytics app by building a completely separate API layer on Cloudflare Workers with Hono, D1, and Chanfana.]]></description>
      <link>https://anthonygtellez.com/blog/2026-01-10-building-public-api-without-exposing-internal-app</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2026-01-10-building-public-api-without-exposing-internal-app</guid>
      <pubDate>Sat, 10 Jan 2026 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Cloudflare Workers]]></category>
      <category><![CDATA[TypeScript]]></category>
      <category><![CDATA[Hono]]></category>
      <category><![CDATA[D1]]></category>
      <category><![CDATA[OpenAPI]]></category>
      <category><![CDATA[API Design]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Infrastructure]]></category>
    </item>
    <item>
      <title><![CDATA[Backtesting a Team Allocation Algorithm Across Six Seasons of Game Data]]></title>
      <description><![CDATA[Validating a quantitative team allocation strategy for a mobile game cooperative mode against six seasons of historical data, and what the numbers reveal about what algorithms can and cannot predict.]]></description>
      <link>https://anthonygtellez.com/blog/2025-12-28-backtesting-game-planning-algorithm</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2025-12-28-backtesting-game-planning-algorithm</guid>
      <pubDate>Sun, 28 Dec 2025 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Python]]></category>
      <category><![CDATA[Game Analytics]]></category>
      <category><![CDATA[Backtesting]]></category>
      <category><![CDATA[Algorithm Design]]></category>
      <category><![CDATA[Data Science]]></category>
      <category><![CDATA[Optimization]]></category>
      <category><![CDATA[Statistics]]></category>
    </item>
    <item>
      <title><![CDATA[Cutting Out the Context Switch: An MCP Server for CISA Advisories and SIEM Query Generation]]></title>
      <description><![CDATA[How I built a Python MCP server that brings CISA KEV lookups, CSAF advisory parsing, IOC extraction, and KQL/SPL query generation directly into Claude Code, and the filtering and caching decisions that made it practical.]]></description>
      <link>https://anthonygtellez.com/blog/2025-12-09-cisa-advisory-mcp-server</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2025-12-09-cisa-advisory-mcp-server</guid>
      <pubDate>Tue, 09 Dec 2025 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Python]]></category>
      <category><![CDATA[MCP]]></category>
      <category><![CDATA[Claude Code]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Threat Intelligence]]></category>
      <category><![CDATA[CISA]]></category>
      <category><![CDATA[SIEM]]></category>
      <category><![CDATA[IOC]]></category>
      <category><![CDATA[KQL]]></category>
      <category><![CDATA[Splunk]]></category>
    </item>
    <item>
      <title><![CDATA[API Economics and MCP: Designing Tools for Credit-Metered Threat Intelligence]]></title>
      <description><![CDATA[When building MCP integrations for credit-metered APIs, the interesting design decisions are not about the protocol. They are about cache consistency, rate limiting, and how narrow tool scope changes what an AI assistant can do autonomously.]]></description>
      <link>https://anthonygtellez.com/blog/2025-12-08-shodan-mcp-server-claude-code</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2025-12-08-shodan-mcp-server-claude-code</guid>
      <pubDate>Mon, 08 Dec 2025 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Python]]></category>
      <category><![CDATA[MCP]]></category>
      <category><![CDATA[Claude Code]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Threat Intelligence]]></category>
      <category><![CDATA[API Design]]></category>
      <category><![CDATA[Caching]]></category>
      <category><![CDATA[Rate Limiting]]></category>
    </item>
    <item>
      <title><![CDATA[Building a CSS Design System as a Standalone npm Package]]></title>
      <description><![CDATA[The site you are reading runs on a design system I extracted into a standalone npm package. Here is how I built it, how the modular export architecture works, and what shipping CSS as a library actually costs.]]></description>
      <link>https://anthonygtellez.com/blog/2025-12-01-building-a-css-design-system-npm-package</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2025-12-01-building-a-css-design-system-npm-package</guid>
      <pubDate>Mon, 01 Dec 2025 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[CSS]]></category>
      <category><![CDATA[Design System]]></category>
      <category><![CDATA[npm]]></category>
      <category><![CDATA[TypeScript]]></category>
      <category><![CDATA[Frontend]]></category>
      <category><![CDATA[Component Library]]></category>
      <category><![CDATA[Web Development]]></category>
      <category><![CDATA[Design Systems]]></category>
      <category><![CDATA[JavaScript]]></category>
      <category><![CDATA[Glassmorphism]]></category>
      <category><![CDATA[Web Components]]></category>
      <category><![CDATA[Accessibility]]></category>
    </item>
    <item>
      <title><![CDATA[The 342x Bug: What Happens When You Sum a Pre-Aggregated Field]]></title>
      <description><![CDATA[A specific data engineering pitfall where summing a pre-aggregated metadata field inflates totals by the group size, hiding in plain sight because every individual value is correct.]]></description>
      <link>https://anthonygtellez.com/blog/2025-11-30-aggregation-bug-pre-aggregated-fields</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2025-11-30-aggregation-bug-pre-aggregated-fields</guid>
      <pubDate>Sun, 30 Nov 2025 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Python]]></category>
      <category><![CDATA[pandas]]></category>
      <category><![CDATA[Data Engineering]]></category>
      <category><![CDATA[Debugging]]></category>
      <category><![CDATA[ETL]]></category>
      <category><![CDATA[Data Quality]]></category>
      <category><![CDATA[Aggregation]]></category>
      <category><![CDATA[Bug Analysis]]></category>
    </item>
    <item>
      <title><![CDATA[OCR as a UX Feature: Eliminating Manual Data Entry with Google Cloud Vision]]></title>
      <description><![CDATA[How I used Google Cloud Vision to read damage numbers from battle screenshots, replacing tedious 10-digit manual entry with a single file upload.]]></description>
      <link>https://anthonygtellez.com/blog/2025-10-28-ocr-ux-google-cloud-vision-game-data-entry</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2025-10-28-ocr-ux-google-cloud-vision-game-data-entry</guid>
      <pubDate>Tue, 28 Oct 2025 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[OCR]]></category>
      <category><![CDATA[Google Cloud Vision]]></category>
      <category><![CDATA[Python]]></category>
      <category><![CDATA[Flask]]></category>
      <category><![CDATA[UX]]></category>
      <category><![CDATA[Game Analytics]]></category>
      <category><![CDATA[Computer Vision]]></category>
    </item>
    <item>
      <title><![CDATA[The Agentic Loop from Scratch: Building Function-Calling AI Without a Framework]]></title>
      <description><![CDATA[What I learned building a full agentic loop in Go from scratch: the tool executor, context window management, voice pipeline, and the problems frameworks solve that you rediscover when you do not use them.]]></description>
      <link>https://anthonygtellez.com/blog/2025-10-15-the-agentic-loop-from-scratch</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2025-10-15-the-agentic-loop-from-scratch</guid>
      <pubDate>Wed, 15 Oct 2025 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Go]]></category>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[LLM]]></category>
      <category><![CDATA[Text-to-Speech]]></category>
      <category><![CDATA[Audio]]></category>
      <category><![CDATA[Agent]]></category>
      <category><![CDATA[Claude]]></category>
      <category><![CDATA[API Design]]></category>
      <category><![CDATA[AI Engineering]]></category>
      <category><![CDATA[Agentic AI]]></category>
      <category><![CDATA[Function Calling]]></category>
      <category><![CDATA[Voice Pipeline]]></category>
      <category><![CDATA[ElevenLabs]]></category>
      <category><![CDATA[Whisper]]></category>
    </item>
    <item>
      <title><![CDATA[Building a Game Analytics Pipeline: ETL, TF-IDF, and K-Means on Team Composition Data]]></title>
      <description><![CDATA[How I applied document similarity techniques to mobile game team compositions, using TF-IDF vectorization and UMAP clustering to identify meta strategies across multiple seasons of Union Raid data.]]></description>
      <link>https://anthonygtellez.com/blog/2025-10-10-game-analytics-etl-ml-pipeline</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2025-10-10-game-analytics-etl-ml-pipeline</guid>
      <pubDate>Fri, 10 Oct 2025 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Python]]></category>
      <category><![CDATA[ETL]]></category>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[UMAP]]></category>
      <category><![CDATA[K-means]]></category>
      <category><![CDATA[TF-IDF]]></category>
      <category><![CDATA[Parquet]]></category>
      <category><![CDATA[Game Analytics]]></category>
      <category><![CDATA[pandas]]></category>
      <category><![CDATA[Data Pipeline]]></category>
      <category><![CDATA[Analytics Engineering]]></category>
    </item>
    <item>
      <title><![CDATA[Building a Provider-Agnostic LLM Interface in Go: Nine Providers, One Abstraction]]></title>
      <description><![CDATA[How I built a clean Go interface abstraction supporting nine LLM providers, what the streaming problem taught me about real-world API behavior, and where leaky abstraction is acceptable.]]></description>
      <link>https://anthonygtellez.com/blog/2025-07-15-provider-agnostic-llm-interface-go</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2025-07-15-provider-agnostic-llm-interface-go</guid>
      <pubDate>Tue, 15 Jul 2025 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Go]]></category>
      <category><![CDATA[LLM]]></category>
      <category><![CDATA[API Design]]></category>
      <category><![CDATA[Claude]]></category>
      <category><![CDATA[OpenAI]]></category>
      <category><![CDATA[SDK]]></category>
      <category><![CDATA[Abstraction]]></category>
      <category><![CDATA[AI Engineering]]></category>
      <category><![CDATA[Anthropic]]></category>
      <category><![CDATA[Gemini]]></category>
      <category><![CDATA[Streaming]]></category>
    </item>
    <item>
      <title><![CDATA[Semantic Recommendation with FAISS and Sentence Transformers]]></title>
      <description><![CDATA[How I built a three-mode content recommendation API using FAISS, sentence-transformers, and TF-IDF over a large media catalog, including what deploying 300MB of ML models to production actually looks like.]]></description>
      <link>https://anthonygtellez.com/blog/2025-04-01-semantic-recommendation-faiss-sentence-transformers</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2025-04-01-semantic-recommendation-faiss-sentence-transformers</guid>
      <pubDate>Tue, 01 Apr 2025 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Python]]></category>
      <category><![CDATA[FAISS]]></category>
      <category><![CDATA[Sentence Transformers]]></category>
      <category><![CDATA[Embeddings]]></category>
      <category><![CDATA[Vector Search]]></category>
      <category><![CDATA[Semantic Search]]></category>
      <category><![CDATA[LLM]]></category>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Recommendation System]]></category>
      <category><![CDATA[FastAPI]]></category>
      <category><![CDATA[Docker]]></category>
      <category><![CDATA[NLP]]></category>
      <category><![CDATA[Recommendation Systems]]></category>
      <category><![CDATA[Cloudflare R2]]></category>
    </item>
    <item>
      <title><![CDATA[Supercharging Security with RAG: SuriCon 2024]]></title>
      <description><![CDATA[How we explored using Retrieval-Augmented Generation and Graphistry to transform Suricata rule management, presented at SuriCon 2024 in Madrid with Leo Meyerovich.]]></description>
      <link>https://anthonygtellez.com/blog/2024-11-21-suricon-supercharging-security-rag</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2024-11-21-suricon-supercharging-security-rag</guid>
      <pubDate>Thu, 21 Nov 2024 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[RAG]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Suricata]]></category>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[LLM]]></category>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[SuriCon]]></category>
      <category><![CDATA[Conference]]></category>
      <category><![CDATA[Graphistry]]></category>
      <category><![CDATA[OpenAI]]></category>
      <category><![CDATA[Rule Management]]></category>
      <category><![CDATA[2024]]></category>
    </item>
    <item>
      <title><![CDATA[CSPM vs. Reality: What Cloud Security Tools Promise and What They Actually Deliver]]></title>
      <description><![CDATA[A field perspective on cloud security posture management tools after running competitive bake-offs against Wiz, Lacework, and Sysdig across Fortune 500 environments. What the demos don't show you.]]></description>
      <link>https://anthonygtellez.com/blog/2023-06-15-cspm-vs-reality</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2023-06-15-cspm-vs-reality</guid>
      <pubDate>Thu, 15 Jun 2023 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Cloud Security]]></category>
      <category><![CDATA[CSPM]]></category>
      <category><![CDATA[AWS]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[DevSecOps]]></category>
      <category><![CDATA[Infrastructure]]></category>
      <category><![CDATA[CNAPP]]></category>
      <category><![CDATA[Prisma Cloud]]></category>
      <category><![CDATA[Wiz]]></category>
      <category><![CDATA[Lacework]]></category>
      <category><![CDATA[Kubernetes]]></category>
      <category><![CDATA[IaC]]></category>
      <category><![CDATA[2023]]></category>
    </item>
    <item>
      <title><![CDATA[Building an Operational Machine Learning Organization from Zero]]></title>
      <description><![CDATA[Comprehensive guide to building ML capabilities at BlockFi from scratch, covering team structure, executive buy-in, blockchain analytics, and operational ML for crypto security.]]></description>
      <link>https://anthonygtellez.com/blog/2022-06-28-building-operational-ml-org-from-zero</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2022-06-28-building-operational-ml-org-from-zero</guid>
      <pubDate>Tue, 28 Jun 2022 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[MLOps]]></category>
      <category><![CDATA[Data Science]]></category>
      <category><![CDATA[Databricks]]></category>
      <category><![CDATA[Cryptocurrency]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Leadership]]></category>
      <category><![CDATA[Blockchain]]></category>
      <category><![CDATA[Conference]]></category>
      <category><![CDATA[BlockFi]]></category>
      <category><![CDATA[2022]]></category>
    </item>
    <item>
      <title><![CDATA[Rethinking NFT Security: What Standard Tokens Actually Provide]]></title>
      <description><![CDATA[A technical look at the security gaps in standard ERC-721 and ERC-1155 tokens, what attack vectors they leave open, and the architectural approaches a 2022 provisional patent addresses for financial-grade digital asset security.]]></description>
      <link>https://anthonygtellez.com/blog/2022-05-20-rethinking-nft-security</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2022-05-20-rethinking-nft-security</guid>
      <pubDate>Fri, 20 May 2022 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[NFT]]></category>
      <category><![CDATA[Blockchain]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Smart Contracts]]></category>
      <category><![CDATA[Ethereum]]></category>
      <category><![CDATA[Web3]]></category>
      <category><![CDATA[Cryptocurrency]]></category>
      <category><![CDATA[ERC-721]]></category>
      <category><![CDATA[Patent]]></category>
      <category><![CDATA[BlockFi]]></category>
      <category><![CDATA[2022]]></category>
    </item>
    <item>
      <title><![CDATA[Graph Analytics for Blockchain Forensics: Tracing $252M in Suspicious Transactions]]></title>
      <description><![CDATA[How we built a crypto-specific graph analytics framework at BlockFi using Nvidia Rapids, Apache Arrow, Graphistry, and Neo4j to trace and flag hundreds of millions in suspicious blockchain transactions.]]></description>
      <link>https://anthonygtellez.com/blog/2022-03-10-graph-analytics-blockchain-forensics</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2022-03-10-graph-analytics-blockchain-forensics</guid>
      <pubDate>Thu, 10 Mar 2022 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Graph Analytics]]></category>
      <category><![CDATA[Blockchain]]></category>
      <category><![CDATA[Cryptocurrency]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Forensics]]></category>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Nvidia Rapids]]></category>
      <category><![CDATA[Databricks]]></category>
      <category><![CDATA[BlockFi]]></category>
      <category><![CDATA[AML]]></category>
      <category><![CDATA[OFAC]]></category>
      <category><![CDATA[2022]]></category>
    </item>
    <item>
      <title><![CDATA[How BlockFi Is Using Machine Learning To Take Crypto Safety to the Moon!]]></title>
      <description><![CDATA[Showcasing BlockFi's use of Splunk and machine learning for cryptocurrency security, including anomaly detection, fraud identification, and graph analytics for blockchain analysis.]]></description>
      <link>https://anthonygtellez.com/blog/2021-10-01-using-machine-learning-crypto-safety</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2021-10-01-using-machine-learning-crypto-safety</guid>
      <pubDate>Fri, 01 Oct 2021 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Cryptocurrency]]></category>
      <category><![CDATA[Blockchain]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Fraud Detection]]></category>
      <category><![CDATA[Graph Analytics]]></category>
      <category><![CDATA[BlockFi]]></category>
      <category><![CDATA[Conference]]></category>
      <category><![CDATA[2021]]></category>
    </item>
    <item>
      <title><![CDATA[Machine Learning for Malware Domain Detection: Lessons from a Patent]]></title>
      <description><![CDATA[How we built machine learning models to classify malicious domains at Splunk scale, covering the feature engineering, model architecture tradeoffs, production challenges, and what made the approach novel enough to patent.]]></description>
      <link>https://anthonygtellez.com/blog/2020-10-20-ml-malware-domain-detection</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2020-10-20-ml-malware-domain-detection</guid>
      <pubDate>Tue, 20 Oct 2020 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Malware]]></category>
      <category><![CDATA[DNS]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Python]]></category>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Threat Detection]]></category>
      <category><![CDATA[Malware Detection]]></category>
      <category><![CDATA[Feature Engineering]]></category>
      <category><![CDATA[Patent]]></category>
      <category><![CDATA[2020]]></category>
    </item>
    <item>
      <title><![CDATA[Creating Custom Containers for the Deep Learning Toolkit]]></title>
      <description><![CDATA[Step-by-step guide to building custom Docker containers for Splunk DLTK, including creating a Nvidia Rapids container for GPU-accelerated machine learning.]]></description>
      <link>https://anthonygtellez.com/blog/2020-01-10-creating-custom-containers-dltk</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2020-01-10-creating-custom-containers-dltk</guid>
      <pubDate>Fri, 10 Jan 2020 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Docker]]></category>
      <category><![CDATA[Deep Learning]]></category>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[TensorFlow]]></category>
      <category><![CDATA[PyTorch]]></category>
      <category><![CDATA[MLOps]]></category>
      <category><![CDATA[GPU]]></category>
      <category><![CDATA[2020]]></category>
    </item>
    <item>
      <title><![CDATA[BSides Brisbane - Beyond The Hype: Machine Learning for Security]]></title>
      <description><![CDATA[Overview of ML & AI concepts for security analysts, with practical walkthroughs of ransomware and botnet detection using machine learning.]]></description>
      <link>https://anthonygtellez.com/blog/2019-06-29-beyond-the-hype-ml-security</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2019-06-29-beyond-the-hype-ml-security</guid>
      <pubDate>Sat, 29 Jun 2019 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[Ransomware]]></category>
      <category><![CDATA[Botnet]]></category>
      <category><![CDATA[Data Science]]></category>
      <category><![CDATA[Conference]]></category>
      <category><![CDATA[Bsides]]></category>
      <category><![CDATA[BSides]]></category>
      <category><![CDATA[2019]]></category>
    </item>
    <item>
      <title><![CDATA[Configure Jupyter Notebook to Interact with Splunk Enterprise]]></title>
      <description><![CDATA[Complete guide to integrating Jupyter Notebook with Splunk Enterprise using Docker, enabling data science workflows directly with Splunk data and the ML Toolkit.]]></description>
      <link>https://anthonygtellez.com/blog/2019-04-25-configure-jupyter-notebook-splunk</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2019-04-25-configure-jupyter-notebook-splunk</guid>
      <pubDate>Thu, 25 Apr 2019 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Jupyter]]></category>
      <category><![CDATA[Python]]></category>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Data Science]]></category>
      <category><![CDATA[Docker]]></category>
      <category><![CDATA[DevOps]]></category>
      <category><![CDATA[2019]]></category>
    </item>
    <item>
      <title><![CDATA[Using Docker and Splunk to Operationalize the Machine Learning Toolkit]]></title>
      <description><![CDATA[Complete guide to setting up Splunk ML Toolkit development environments using Docker, including automated app installation and configuration.]]></description>
      <link>https://anthonygtellez.com/blog/2019-03-19-using-docker-splunk-operationalize-mltk</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2019-03-19-using-docker-splunk-operationalize-mltk</guid>
      <pubDate>Tue, 19 Mar 2019 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Docker]]></category>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Data Science]]></category>
      <category><![CDATA[MLOps]]></category>
      <category><![CDATA[MLTK]]></category>
      <category><![CDATA[DevOps]]></category>
      <category><![CDATA[2019]]></category>
    </item>
    <item>
      <title><![CDATA[SuriCon 2018 - Beyond Operational Intelligence: Splunk Advanced Analytics]]></title>
      <description><![CDATA[Exploring the journey from reactive to prescriptive analytics in security operations, covering the advanced analytics maturity model and ML-driven incident response automation.]]></description>
      <link>https://anthonygtellez.com/blog/2018-11-15-beyond-operational-intelligence</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2018-11-15-beyond-operational-intelligence</guid>
      <pubDate>Thu, 15 Nov 2018 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Suricata]]></category>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Analytics]]></category>
      <category><![CDATA[Data Science]]></category>
      <category><![CDATA[SuriCon]]></category>
      <category><![CDATA[Conference]]></category>
      <category><![CDATA[2018]]></category>
    </item>
    <item>
      <title><![CDATA[.Conf18 - Turning Security Use Cases into SPL]]></title>
      <description><![CDATA[Deep dive on SPL patterns for security use cases, covering tstats command optimization, data model acceleration, and tried-and-tested query patterns for threat detection.]]></description>
      <link>https://anthonygtellez.com/blog/2018-10-02-security-use-cases-into-spl</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2018-10-02-security-use-cases-into-spl</guid>
      <pubDate>Tue, 02 Oct 2018 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[SPL]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Data Science]]></category>
      <category><![CDATA[Threat Detection]]></category>
      <category><![CDATA[Conference]]></category>
      <category><![CDATA[2018]]></category>
    </item>
    <item>
      <title><![CDATA[Dark Reading - How to Use AI and Machine Learning to Improve Enterprise Security]]></title>
      <description><![CDATA[Webinar defining AI and machine learning in cybersecurity context, with practical applications for speeding incident response and optimizing security staff resources.]]></description>
      <link>https://anthonygtellez.com/blog/2018-08-16-dark-reading-ml-security</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2018-08-16-dark-reading-ml-security</guid>
      <pubDate>Thu, 16 Aug 2018 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[AI]]></category>
      <category><![CDATA[Threat Detection]]></category>
      <category><![CDATA[Enterprise Security]]></category>
      <category><![CDATA[Dark Reading]]></category>
      <category><![CDATA[Webinar]]></category>
      <category><![CDATA[Incident Response]]></category>
      <category><![CDATA[2018]]></category>
    </item>
    <item>
      <title><![CDATA[SuriCon 2017 - Malware Analysis: Suricata & Splunk for Better Rule Writing]]></title>
      <description><![CDATA[A framework using Suricata and Splunk with public malware PCAPs to iteratively analyze network behavior and develop better IDS/IPS detection rules.]]></description>
      <link>https://anthonygtellez.com/blog/2017-11-17-malware-analysis-suricata-splunk-rule-writing</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2017-11-17-malware-analysis-suricata-splunk-rule-writing</guid>
      <pubDate>Fri, 17 Nov 2017 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Suricata]]></category>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Malware Analysis]]></category>
      <category><![CDATA[IDS]]></category>
      <category><![CDATA[IPS]]></category>
      <category><![CDATA[Network Security]]></category>
      <category><![CDATA[PCAP]]></category>
      <category><![CDATA[Rule Writing]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[SuriCon]]></category>
      <category><![CDATA[Conference]]></category>
      <category><![CDATA[Emerging Threats]]></category>
      <category><![CDATA[Mirai]]></category>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Data Science]]></category>
      <category><![CDATA[Security Operations]]></category>
      <category><![CDATA[2017]]></category>
    </item>
    <item>
      <title><![CDATA[SuriCon 2017 - Hunting BotNets: Suricata Advanced Security Analytics]]></title>
      <description><![CDATA[Practical machine learning techniques for botnet detection using Suricata data, covering data exfiltration, traffic analysis, and advanced threat detection workflows.]]></description>
      <link>https://anthonygtellez.com/blog/2017-11-16-hunting-botnets-suricata-advanced-security-analytics</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2017-11-16-hunting-botnets-suricata-advanced-security-analytics</guid>
      <pubDate>Thu, 16 Nov 2017 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Suricata]]></category>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Botnet]]></category>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[IDS]]></category>
      <category><![CDATA[SuriCon]]></category>
      <category><![CDATA[Conference]]></category>
      <category><![CDATA[2017]]></category>
    </item>
    <item>
      <title><![CDATA[.Conf17 - Everyone Can Build A Security App]]></title>
      <description><![CDATA[Hands-on workshop teaching security practitioners how to build operational Splunk apps, covering methodology, data enrichment, visualization, and machine learning techniques.]]></description>
      <link>https://anthonygtellez.com/blog/2017-10-02-everyone-can-build-a-security-app</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2017-10-02-everyone-can-build-a-security-app</guid>
      <pubDate>Mon, 02 Oct 2017 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Data Science]]></category>
      <category><![CDATA[App Development]]></category>
      <category><![CDATA[Conference]]></category>
      <category><![CDATA[Workshop]]></category>
      <category><![CDATA[2017]]></category>
    </item>
    <item>
      <title><![CDATA[Enhancing Splunk Visualizations with Mapbox]]></title>
      <description><![CDATA[Step-by-step guide to integrating Mapbox API with Splunk for enhanced geographical visualizations, including custom tiles and the Missile Map visualization.]]></description>
      <link>https://anthonygtellez.com/blog/2017-05-03-enhancing-splunk-visualizations-mapbox</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2017-05-03-enhancing-splunk-visualizations-mapbox</guid>
      <pubDate>Wed, 03 May 2017 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Mapbox]]></category>
      <category><![CDATA[Data Visualization]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Geospatial]]></category>
      <category><![CDATA[Visualization]]></category>
      <category><![CDATA[GeoViz]]></category>
      <category><![CDATA[2017]]></category>
    </item>
    <item>
      <title><![CDATA[Analyzing Shadowbrokers Implants]]></title>
      <description><![CDATA[Security analysis of the Shadow Brokers NSA tool leak and its impact on enterprise security, with Splunk-based detection strategies.]]></description>
      <link>https://anthonygtellez.com/blog/2017-04-14-shadow-brokers-analysis</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2017-04-14-shadow-brokers-analysis</guid>
      <pubDate>Fri, 14 Apr 2017 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[ShadowBrokers]]></category>
      <category><![CDATA[Malware Analysis]]></category>
      <category><![CDATA[Threat Intelligence]]></category>
      <category><![CDATA[APT]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[2017]]></category>
    </item>
    <item>
      <title><![CDATA[Proactively Responding to Cloudbleed with Splunk]]></title>
      <description><![CDATA[How to use Splunk and a Cloudflare domain lookup to identify users exposed to the Cloudbleed memory leak vulnerability and prioritize credential rotation.]]></description>
      <link>https://anthonygtellez.com/blog/2017-02-25-cloudbleed-splunk-response</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2017-02-25-cloudbleed-splunk-response</guid>
      <pubDate>Sat, 25 Feb 2017 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Cloudflare]]></category>
      <category><![CDATA[Cloudbleed]]></category>
      <category><![CDATA[Incident Response]]></category>
      <category><![CDATA[Vulnerability]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Threat Intelligence]]></category>
      <category><![CDATA[DNS]]></category>
      <category><![CDATA[Suricata]]></category>
      <category><![CDATA[URL Toolbox]]></category>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[SPL]]></category>
      <category><![CDATA[2017]]></category>
    </item>
    <item>
      <title><![CDATA[Enhancing Enterprise Security for Ransomware]]></title>
      <description><![CDATA[Step-by-step guide to integrating abuse.ch's ransomware intelligence feed into Splunk Enterprise Security for enhanced threat detection and response.]]></description>
      <link>https://anthonygtellez.com/blog/2017-01-24-enhancing-enterprise-security-ransomware</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2017-01-24-enhancing-enterprise-security-ransomware</guid>
      <pubDate>Tue, 24 Jan 2017 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Ransomware]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Threat Detection]]></category>
      <category><![CDATA[Threat Intelligence]]></category>
      <category><![CDATA[Enterprise Security]]></category>
      <category><![CDATA[2017]]></category>
    </item>
    <item>
      <title><![CDATA[SSL Proxy: Splunk & NGINX]]></title>
      <description><![CDATA[How to use NGINX and Let's Encrypt to put a secure SSL reverse proxy in front of a Splunk Search Head running on an unprivileged port.]]></description>
      <link>https://anthonygtellez.com/blog/2016-12-23-ssl-reverse-proxy-nginx</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2016-12-23-ssl-reverse-proxy-nginx</guid>
      <pubDate>Fri, 23 Dec 2016 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[NGINX]]></category>
      <category><![CDATA[Let's Encrypt]]></category>
      <category><![CDATA[SSL]]></category>
      <category><![CDATA[TLS]]></category>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Linux]]></category>
      <category><![CDATA[Reverse Proxy]]></category>
      <category><![CDATA[Infrastructure]]></category>
      <category><![CDATA[Cryptography]]></category>
      <category><![CDATA[HSTS]]></category>
      <category><![CDATA[PKI]]></category>
      <category><![CDATA[2016]]></category>
    </item>
    <item>
      <title><![CDATA[Analyzing BotNets with Suricata & Machine Learning]]></title>
      <description><![CDATA[Using Splunk's Machine Learning Toolkit and Suricata data to analyze and predict Mirai botnet activity through K-means clustering and Random Forest classification.]]></description>
      <link>https://anthonygtellez.com/blog/2016-12-23-analyzing-mirai-with-ml-toolkit</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2016-12-23-analyzing-mirai-with-ml-toolkit</guid>
      <pubDate>Fri, 23 Dec 2016 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Suricata]]></category>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Mirai]]></category>
      <category><![CDATA[Botnet]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Data Science]]></category>
      <category><![CDATA[IDS]]></category>
      <category><![CDATA[Analytics]]></category>
      <category><![CDATA[2016]]></category>
    </item>
    <item>
      <title><![CDATA[SuriCon 2016 - Applying Data Science to Suricata]]></title>
      <description><![CDATA[Keynote presentation on applying machine learning toolkits to Suricata data for threat detection, covering data exfiltration, port analysis, and advanced threat use cases.]]></description>
      <link>https://anthonygtellez.com/blog/2016-11-10-applying-data-science-to-suricata</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2016-11-10-applying-data-science-to-suricata</guid>
      <pubDate>Thu, 10 Nov 2016 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Suricata]]></category>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Data Science]]></category>
      <category><![CDATA[IDS]]></category>
      <category><![CDATA[SuriCon]]></category>
      <category><![CDATA[Conference]]></category>
      <category><![CDATA[2016]]></category>
    </item>
    <item>
      <title><![CDATA[.Conf16 - Anomaly Hunting with Splunk Software]]></title>
      <description><![CDATA[Conference presentation on machine learning toolkits in Splunk for security practitioners, covering anomaly detection, data exfiltration, and advanced threat use cases.]]></description>
      <link>https://anthonygtellez.com/blog/2016-09-29-anomaly-hunting-with-splunk-software</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2016-09-29-anomaly-hunting-with-splunk-software</guid>
      <pubDate>Thu, 29 Sep 2016 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Machine Learning]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[Data Science]]></category>
      <category><![CDATA[Anomaly Detection]]></category>
      <category><![CDATA[Conference]]></category>
      <category><![CDATA[2016]]></category>
    </item>
    <item>
      <title><![CDATA[An Exercise in Threat Attribution: GRIZZLY STEPPE]]></title>
      <description><![CDATA[A hands-on exercise using Splunk to evaluate the DHS and DNI GRIZZLY STEPPE indicators of compromise and assess whether they overlap with known Tor exit nodes.]]></description>
      <link>https://anthonygtellez.com/blog/2016-02-28-threat-attribution-exercise</link>
      <guid isPermaLink="true">https://anthonygtellez.com/blog/2016-02-28-threat-attribution-exercise</guid>
      <pubDate>Sun, 28 Feb 2016 00:00:00 GMT</pubDate>
      <dc:creator><![CDATA[Anthony G. Tellez]]></dc:creator>
      <category><![CDATA[Splunk]]></category>
      <category><![CDATA[Threat Intelligence]]></category>
      <category><![CDATA[Threat Attribution]]></category>
      <category><![CDATA[APT]]></category>
      <category><![CDATA[IOC]]></category>
      <category><![CDATA[GRIZZLY STEPPE]]></category>
      <category><![CDATA[DHS]]></category>
      <category><![CDATA[DNS]]></category>
      <category><![CDATA[Suricata]]></category>
      <category><![CDATA[Tor]]></category>
      <category><![CDATA[SPL]]></category>
      <category><![CDATA[Incident Response]]></category>
      <category><![CDATA[Geopolitics]]></category>
      <category><![CDATA[Security Research]]></category>
      <category><![CDATA[Security]]></category>
      <category><![CDATA[2016]]></category>
    </item>
  </channel>
</rss>