Keeping up with the changing security landscape due to AI
Open Source Dependency Threats
The One True Secure Framework, Secure Code Best Practices
Authenticating Open Source Developers
EasyJSON, Software Dependencies, Breaches
Secure-by-Default, Vibe Coding, and Going Back to Basics
Intentionally-Vulnerable MCP Server, Hallucinating Software Packages
Model Context Protocol, A2A, NHI Authentication
Signing Models, Vibe Coding, GitHub Action Abuse
Middleware Vulnerabilities, Identifying Enumeration with LLMs
Conferences, Addressing Destructive Fatigue, Imposter Syndrome
ProdSec Metrics, Asset Monitoring, Vulnerability Management