
Making a dent in the tech universe
Making a dent in the tech universe
The Myth of Icarus and the Modern Dilemma of AI-Augmented Coding
Once upon a time—well, in a land of myth and melodrama—a young chap named Icarus got the ultimate upgrade: wings. Handcrafted by his ever-wise (and occasionally overly ambitious) father, Daedalus, these wings were a marvel of ancient engineering, crafted from feathers and wax. Icarus, thrilled by his newfound ability to defy gravity, soared into the sky with the enthusiasm of a kid on a sugar rush.

OWASP Top 10: Key Takeaways from a Secure Code Training Course
I recently attended a Secure Code Training course hosted by PrivSec Consulting. The course broadly followed the OWASP Top Ten, representing the most critical security risks to web applications.

How can we guard against CrowdStrike
As the dust settles on the CrowdStrike event, it highlights the juxtaposition of combating security issues with both third party Agents / automated software update systems and trying to keep our servers patched up and secure. What can we do to prevent this type of attack?

OWASP Top 10: Key Takeaways from a Secure Code Training Course
I recently attended a Secure Code Training course hosted by PrivSec Consulting. The course broadly followed the OWASP Top Ten, representing the most critical security risks to web applications.

How can we guard against CrowdStrike
As the dust settles on the CrowdStrike event, it highlights the juxtaposition of combating security issues with both third party Agents / automated software update systems and trying to keep our servers patched up and secure. What can we do to prevent this type of attack?