agents (4) ai (9) api-security (1) appsec (2) authorization (1) bola (1) career (1) devex (1) epistemology (2) game-theory (1) leverage (1) llms (6) maths (1) mcp (1) movies (2) philosophy (7) science (2) secure-by-default (1) security (11) spirituality (1) systems-thinking (1) technology (2)

 agents (4)

MCP security - The new supply chain risk for AI agents
Epistemic security - The missing control plane for AI agents
The AI agent dilemma - Why we are outsourcing our reality
Threat Modeling Autonomous AI Agents in Production

 ai (9)

MCP security - The new supply chain risk for AI agents
Epistemic security - The missing control plane for AI agents
The AI agent dilemma - Why we are outsourcing our reality
Game theory for cybersecurity: from reactive defense to strategic resilience
Threat Modeling Autonomous AI Agents in Production
Traditional manual code review is no longer sustainable
Why Transformer LLMs are better at finding code vulnerabilities than classical neural networks
Vibe Engineering
Designing a living ecosystem of AI agents

 api-security (1)

How to eliminate an entire class of API authorization bugs

 appsec (2)

How to eliminate an entire class of API authorization bugs
Reframing Application Security

 authorization (1)

How to eliminate an entire class of API authorization bugs

 bola (1)

How to eliminate an entire class of API authorization bugs

 career (1)

Why grinding is a self-inflicted DDoS

 devex (1)

Reframing Application Security

 epistemology (2)

Epistemic security - The missing control plane for AI agents
The AI agent dilemma - Why we are outsourcing our reality

 game-theory (1)

Why grinding is a self-inflicted DDoS

 leverage (1)

Why grinding is a self-inflicted DDoS

 llms (6)

MCP security - The new supply chain risk for AI agents
Epistemic security - The missing control plane for AI agents
Game theory for cybersecurity: from reactive defense to strategic resilience
Threat Modeling Autonomous AI Agents in Production
Traditional manual code review is no longer sustainable
Why Transformer LLMs are better at finding code vulnerabilities than classical neural networks

 maths (1)

Problem solving and the art of the convincing argument

 mcp (1)

MCP security - The new supply chain risk for AI agents

 movies (2)

Was Thanos Right?
Why The Batman feels so personal

 philosophy (7)

Life is cruel
Exploring Philosophical Parallels - Nietzsche and Vedanta
Resolving the Epicurean Paradox - A Perspective from Advaita Vedanta
Man is a machine
Understanding the Concept of Brahman and Atman
The Science of akashic field
Socratic dialogue

 science (2)

Man's greatest achievement
How to study based on how memory works

 secure-by-default (1)

Reframing Application Security

 security (11)

How to eliminate an entire class of API authorization bugs
MCP security - The new supply chain risk for AI agents
Epistemic security - The missing control plane for AI agents
The AI agent dilemma - Why we are outsourcing our reality
Game theory for cybersecurity: from reactive defense to strategic resilience
Threat Modeling Autonomous AI Agents in Production
Traditional manual code review is no longer sustainable
Why Transformer LLMs are better at finding code vulnerabilities than classical neural networks
Reframing Application Security
Crash Course in x86 - Part I
Memory exploit mitigation techniques

 spirituality (1)

The Science of akashic field

 systems-thinking (1)

Why grinding is a self-inflicted DDoS

 technology (2)

Revisiting the Unabomber
Elon Musk on xAI