[{"content":"Technical documentation is often underestimated until it becomes necessary.\nWhen a team needs to respond faster, transfer knowledge, reduce dependency on specific people, or better understand an environment, the quality and accessibility of its documentation become critical.\nThe underlying problem In many organizations, technical knowledge exists, but it is:\nfragmented incomplete outdated difficult to access too dependent on the people who remember it This creates friction, rework, and wasted time.\nWhere AI can help Artificial intelligence can create value at several layers, for example:\nStructuring support It can help organize information, summarize content, suggest classifications, or support parts of the documentation normalization process.\nContextual access It can improve access to technical knowledge when combined with contextual retrieval mechanisms.\nWriting assistance It can support drafting, rewriting, consolidation, and improvement of technical content.\nKnowledge reuse It can help existing information be reused in new contexts instead of remaining buried in old files or notes.\nWhat it should not do alone AI should not replace technical validation or become an automated way to produce documentation that looks polished but is inaccurate.\nWhen used without control, the result may be elegant but unreliable.\nWhat makes more sense It makes more sense to use AI to:\naccelerate organize retrieve reformulate assist while keeping human review whenever the content has technical, operational, or security impact.\nA clear opportunity When used properly, AI can turn documentation into a much more useful asset.\nNot only as a historical archive, but as a living layer of accessible, connected, and reusable knowledge.\nThat is where real value begins.\n","permalink":"https://www.hectorherrera.pro/en/blog/ai-applied-to-documentation-and-technical-knowledge/","summary":"AI can help organizations make better use of technical documentation when applied with judgment and practical focus.","title":"AI applied to documentation and technical knowledge"},{"content":"Summary A project focused on exploring and structuring practical ways to integrate artificial intelligence with cybersecurity tools and platforms.\nContext Organizations often operate multiple security tools that generate findings, events, configurations, technical data, and fragmented knowledge. There is a clear opportunity for AI to help interpret, contextualize, and make better use of that information.\nProblem Even when security platforms generate valuable data, it is not always easy to turn it into useful context, prioritization criteria, faster responses, or clearer decision support.\nSolution An integration approach was defined where AI can support tasks such as:\ninterpretation of technical results contextual access to findings support for documentation and reporting bridging technical knowledge and operations automation of selected analysis workflows Technologies involved cybersecurity software APIs automation AI models integration architecture Role Conceptual definition, approach structuring, use case identification, and integration design.\nResult A working line of thought was consolidated around connecting AI capabilities with security tools in a controlled, useful, and business-relevant way.\nLessons learned integrating AI with security requires control, judgment, and practical focus not every use case needs full automation the greatest value often appears when AI improves context, understanding, and speed of work ","permalink":"https://www.hectorherrera.pro/en/projects/ai-integrated-with-cybersecurity-software/","summary":"Exploration and structuring of use cases where AI connects with security tools to create practical value.","title":"AI integrated with cybersecurity software"},{"content":"RAG has become one of the most frequently mentioned approaches when discussing AI applied to knowledge. However, in cybersecurity, value does not come from simply connecting documents to a model.\nValue appears when the architecture responds to a real need.\nThe problem is not only answering questions In many environments, security information is spread across:\nprocedures reports technical findings internal documentation configurations tool outputs knowledge held by specific people The problem is not always a lack of information. Often the challenge is that accessing it takes time, depends on manual searches, or requires knowing in advance where everything lives.\nWhere it can actually create value A well-designed RAG system can help with:\ncontextual access to procedures retrieving relevant technical information without manually navigating multiple sources supporting documentation tasks connecting findings with existing knowledge improving operational access to knowledge This does not replace technical judgment. It supports it.\nWhat makes it truly useful For RAG to create real value in cybersecurity, at least these conditions matter:\n1. It must be designed around the use case Not every problem needs RAG. In some cases, a well-structured documentation base, a clear taxonomy, or a better search solution is enough.\n2. Context matters more than AI messaging If the loaded information is irrelevant, disorganized, or unreliable, the output will not be useful even if the model is strong.\n3. Control matters In security, privacy, and sensitive knowledge contexts, relying on external solutions is not always acceptable. That is why on-premise or tightly controlled architectures often make sense.\n4. Value is not only about answering It can also be about:\naccelerating analysis reducing friction in knowledge access improving documentation consistency supporting internal processes The most common mistake One of the most frequent mistakes is starting with the model instead of the problem.\nWhen that happens, the solution may look good in a demo, but it does not solve anything important in the real operation.\nA more useful perspective RAG can be a valuable component in cybersecurity if it is understood as an architecture for contextual knowledge access, not just as a chatbot backed by documents.\nThat shift in perspective makes all the difference.\n","permalink":"https://www.hectorherrera.pro/en/blog/how-rag-can-create-real-value-in-cybersecurity/","summary":"RAG becomes useful in cybersecurity when it is designed around real problems, not just as an AI demo.","title":"How RAG can create real value in cybersecurity"},{"content":"Summary Design and implementation of an on-premise RAG architecture focused on contextual access to technical, documentary, and operational knowledge, with an emphasis on control, privacy, and practical enterprise use.\nContext Many organizations have valuable knowledge spread across documents, procedures, technical notes, tool outputs, and other unstructured sources. The challenge is rarely the absence of information, but the difficulty of accessing it in a useful, contextual, and efficient way.\nProblem Knowledge access is often fragmented, dependent on specific people, or based on slow manual searches. This limits responsiveness, knowledge reuse, and operational efficiency.\nSolution An on-premise RAG solution was designed to:\ningest selected documents process and chunk content index knowledge for retrieval answer questions using recovered context operate inside a controlled environment Technologies involved Linux Docker Hugo local models vector database automation and integration components Role Architecture, approach definition, technical structuring, and conceptual integration of the system.\nResult A functional foundation was established for contextual knowledge access, designed for practical use and controlled evolution in enterprise environments.\nLessons learned real value does not come only from the model, but from the architecture and context controlling knowledge and information flow is as important as response generation a useful RAG solution must be designed around the use case, not around technology trends ","permalink":"https://www.hectorherrera.pro/en/projects/on-premise-rag-contextual-access/","summary":"A local RAG architecture focused on contextual access, information control, and practical enterprise use.","title":"On-premise RAG system for contextual knowledge access"},{"content":"","permalink":"https://www.hectorherrera.pro/en/404.html","summary":"","title":"Page not found"}]