Interview Assessments
We built a blue-team mode for AI security training — you write a defensive prompt, we throw 12 attack probes at it
Questions about data blockers
Post Implementation task
Cyber security jobs in Austria
Personal favorite deception layer.
Learning way
How do you report large volume detections to a CISO without making the BPA report a SOC story?
CTO at NCSC Summary: week ending May 17th
Thinkpad vs Macbook pro endpoint security
20 loaded