Automated Patching of Python Dependencies: Securing Your Codebase with pip-audit and CI/CDIntroductionOct 19Oct 19
Published inDevSecOps & AINavigating User Privacy in the Age of Generative AIWe live in a moment of magic. With a few keystrokes, we can conjure stunning images, draft eloquent emails, and debug complex code, all…Sep 21Sep 21
Why MITRE ATLAS is a Game-Changer for Adversarial Machine LearningIf you work in cybersecurity, you’ve undoubtedly felt the impact of the MITRE ATT&CK framework. It gave us a common language to describe…Sep 21Sep 21
Published inDevSecOps & AISecurity 101: Model Context ProtocolImplementing secure MCP (Model Context Protocol) in enterprise settings requires a blend of AI architecture, data governance, and…May 10May 10
Published inCubedMaking AI Smarter with Context: Model Context Protocol (MCP)Context in AIApr 18Apr 18
Summary on Framework for Adoption of Cloud Services by SEBI Regulated Entities (REs)In march 2023, SEBI published a framework for adoption of cloud services by SEBI Regulated Entities (REs). This framework is loosly based…Dec 1, 2024Dec 1, 2024
Vehicle Hacking & Safety in 21st CenturyCar hacking refers to all of the ways hackers can exploit weaknesses in an automobile’s software, hardware, and communication systems in…Feb 17, 2024Feb 17, 2024
Passwordless-AuthenticationPasswords are one of the oldest forms of digital security and one of the weakest links in identity management and authentication. Phishing…Jan 21, 2024A response icon1Jan 21, 2024A response icon1
ChatGPT-101 Part 2In continuation to my previous Article: ChatGPT-101 (https://medium.com/p/5a554961febc /…Dec 14, 2023Dec 14, 2023