Posts

The Case Against Automatic Dependency Updates

Posts

Harvesting Logs for Fun and Profit

Posts

Why AppSec fails

Posts

Precision Munitions for Denial of Service

Posts

Curating Dependency Vulnerabilities