MCPs are just other people’s prompts and other people’s APIs
I’ve been thinking about Model Context Protocols (MCPs) for months, and here’s the simplest way to explain what they actually are: MCPs are other people’s…
I’ve been thinking about Model Context Protocols (MCPs) for months, and here’s the simplest way to explain what they actually are: MCPs are other people’s…
The Simple Truth About MCPs I’ve been thinking about Model Context Protocols (MCPs) for months, and here’s the simplest way to explain what they actually…
Unrestricted Resource Consumption (API4:2023) is the only threat category in the OWASP API Security Top 10 explicitly dedicated to Denial of Service (DoS) and resource…
Rage-fueled Rewrite Monday morning I discovered that some tl;dr sec automation I’d built in Zapier randomly stopped working, despite me not touching it for months.…
With innovation comes risk. As organizations race to build AI-first infrastructure, security is struggling to keep pace. Multi-Agentic Systems – those built on Large Language…
It hit me like a lightning bolt during a casual conversation about AI safety: we’re tuning these models for adults, but kids are using them…
In the world of bug bounty hunting, having a short domain for XSS payloads can be the difference in exploiting a bug or not… and…
The moment when you realize what was previously impossible is now trivial I just wrote a new piece about the two primary limitations to creativity.…
If you are a CISO or cybersecurity leader looking to scale your bug bounty program but are not sure when the right time to do this is, how to do this in…
Who is not being laid off? That’s the question. I’m thinking about all these layoffs. I’m trying to figure out if there’s anything we can…
I think there are two primary ways we limit our own creativity. What I’ll call Type 1 is the inability to access your true, internal…
Here’s a different way to think about the change coming to the workforce and economy from AI. Imagine everyone in the world has 10,000 brains,…