Security
LLMs at Work: Outsourcing Vendor Assessment Toil to AI
Streamlining Security Incident Response with Automation and Large Language Models
Mapping the Attack Surface from the Inside
An Introduction to Reverse Engineering for eBPF Bytecode
On Reviewing Employee Accesses Managed Through Okta
Mercari’s passkey adoption
Bucket full of secrets – Terraform exfiltration
The Art of the Security Double Play: How Mercari Combines Internal Audits and Custom CodeQL Queries to Keep Systems Safe
Follow the White Rabbit: Finding The Women With The Red Dress In A Torrent of Event Logs
Supply-Chain Security: Evaluation of Threats and Mitigations