
Securing MCP: a defense-first architecture guide
Why the Model Context Protocol needs a new security mental model, and how to build it.

Why the Model Context Protocol needs a new security mental model, and how to build it.

A scenario-driven workflow for tracing attack paths in agentic AI systems using a five-zone navigation lens, attack trees, and OWASP’s threat taxonomy and playbooks.

How the shift from single-model LLM integrations to agentic AI systems amplifies prompt injection into a multi-step attack chain.

Learn how dependency cooldowns protect against supply chain attacks by delaying automatic adoption of new package versions.

A pragmatic defense-first guide for modern DevOps.

Empower cybersecurity in software development projects with these easy and effective first steps.

I was interviewed about improving cyber resilience through Micro Attack Simulations.

Summarizing the current state of advice regarding the Log4j vulnerability.

Details about the vulnerability class Untrusted Deserialization.