Type something to search...

Blog Posts

Claude Code Has Two New CVEs — Here's What They Exploit and How to Harden Your Setup

Claude Code Has Two New CVEs — Here's What They Exploit and How to Harden Your Setup

Claude Code Has Two New CVEs — Here's What They Exploit and How to Harden Your Setup Your engineers cloned repositories today. Probably dozens. If any of those repos contained a malicious `.claude/

read more
How I Made Claude Code Safer (And You Can Too)

How I Made Claude Code Safer (And You Can Too)

How I Made Claude Code Safer (And You Can Too) I've been running Claude Code on real projects for months. It's great at writing code — but it doesn't always understand the consequences of what it w

read more
I Ran 849 Tests on AI Context Files. Here's What Actually Works.

I Ran 849 Tests on AI Context Files. Here's What Actually Works.

I Ran 849 Tests on AI Context Files. Here's What Actually Works. After 849 controlled tests, $20 in API costs, and a week of experiments, I can tell you exactly how to organize your Claude Code ref

read more
Pre-Selection Beats Post-Selection: How I Made Claude Code 10-30x Faster

Pre-Selection Beats Post-Selection: How I Made Claude Code 10-30x Faster

Pre-Selection Beats Post-Selection: How I Made Claude Code 10-30x FasterEvery code navigation costs time. When you mult

read more
4 Essentials for Executive & Business Buyin on your Incident Response Plan

4 Essentials for Executive & Business Buyin on your Incident Response Plan

4 Essentials for Executive & Business Buyin on your Incident Response Plan The impact and subsequent fallout from a business-impacting cyber security attack are stressful at the best of times. Exp

read more
The CyberSecurity & Evolving Threats

The CyberSecurity & Evolving Threats

The CyberSecurity & Evolving Threats Cybersecurity is a critical concern in today's world, as more and more of our daily lives are conducted online. The threat landscape is constantly evolving, and

read more