All Articles
THIS MONTHBrowse all curated articles across categories
Quantization from the ground up
Unlocking the Secrets of Quantization in AI Models
My minute-by-minute response to the LiteLLM malware attack
Urgent Response to LiteLLM Malware Attack Highlights Supply Chain Vulnerabilities
We Rewrote JSONata with AI in a Day, Saved $500K/Year
Transforming JSONata with AI: A $500K Savings in Just One Day
A year of open source vulnerability trends: CVEs, advisories, and malware
Navigating the Shifting Landscape of Open Source Vulnerabilities
What’s coming to our GitHub Actions 2026 security roadmap
GitHub Actions Unveils 2026 Security Roadmap to Fortify Software Supply Chains
Sysdig Adds Runtime to Secure AI Coding Agents
Sysdig Unveils Secure Runtime for AI Coding Agents at RSA Conference
GitHub to Leverage User Code for AI Model Training, Allows Opt-Out
GitHub's New AI Model Training Approach: User Code Utilization with Opt-Out Option
What is Hardware Tracking? How to Implement it (And Keep it Accurate)
Mastering Hardware Tracking: A Key to IT Asset Management Success
How AI Will Break the 1–3x ITSM Implementation Cost Rule
Revolutionizing ITSM: How AI Disrupts Implementation Costs
CRITICAL: CISA: New Langflow flaw actively exploited to hijack AI workflows
CRITCritical Langflow Vulnerability Exploited to Hijack AI Workflows
Ajax football club hack exposed fan data, enabled ticket hijack
Ajax Football Club Hack Exposes Fan Data and Enables Ticket Hijack
CRITICAL: China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks
CRITChina-Linked Red Menshen Deploys Stealthy BPFDoor Implants in Telecom Espionage